What Is This?

This is an HTML+RDFa representation of metadata describing this Web-addressable resource.

Why Is This Important?

The property (attributes and values pairs) links on this page unveil a different kind of link, one which enables the following on HTTP networks such as the Web:

  1. Unambiguous identity for entities (aka. strong identifiers)
  2. Implicit binding of an entity and its metadata via strong identifiers
  3. Multiple metadata representations that enable a variety of presentations
  4. High precision Search and Find queries that simply use the metadata documents (by referencing entity URIs) as the query's Data Source Name

How Do I Discover Alternative Metadata Representations?

This document exposes metadata in the following formats: (X)HTML+RDFa, Turtle, N3, RDF/JSON, or RDF/XML. In the most basic form, you can simply view the (X)HTML source markup of this page, and go directly to the <head/> section which contains a <link/> tag with relationship and type properties for each format.

In addition, you can also explicitly request a desired metadata representation for a given resource via HTTP GET requests that use the entity's strong identifier as the call target.

How Can I Expose My Web Resources In This Manner?

Simply include the following in the <head/> section of your (static or dynamically generated) (X)HTML page:

<link rel="alternate" title="My Data in RDF Linked Data form"
type="application/rdf+xml"
href="http://linkeddata.uriburner.com/about/id/<this-page-URL>/>"

How Is This Related To The Linked Data Meme?

As stated above, the links in this page expose strong identifiers for its primary topic, secondary topics, attributes, and some values. These links, via implicit association, act as conduits to their metadata-bearing documents, in a variety formats.

[OpenLink Software]

About: Backdoor (computing) - Wikipedia

An Entity of Type : Thing, from Data Source : https://en.m.wikipedia.org/wiki/Backdoor_(computing), within Data Space : dev.restore.ovi.cnr.it:8890

  • References
  • Referenced By
content

og:title
  • Backdoor (computing) - Wikipedia
og:type
  • website
Title
  • Backdoor (computing) - Wikipedia
links to
  • https://en.m.wikipedia.org/wiki/Wikipedia:Verifiability
  • https://en.m.wikipedia.org/wiki/Help:Maintenance_template_removal
  • https://en.m.wikipedia.org/wiki/Wikipedia:Citing_sources#Inline_citations
  • https://en.m.wikipedia.org/wiki/Authentication
  • https://en.m.wikipedia.org/wiki/Borland
  • https://en.m.wikipedia.org/wiki/Delphi_(programming_language)
  • https://en.m.wikipedia.org/wiki/Software_agent
  • https://en.m.wikipedia.org/wiki/NSA
  • https://de.wikipedia.org/wiki/Backdoor
  • https://en.m.wikipedia.org/wiki/Black_box
  • https://en.m.wikipedia.org/wiki/Linux_kernel
  • https://en.m.wikipedia.org/wiki/Plug-in_(computing)
  • https://en.m.wikipedia.org/wiki/Cloud_computing
  • https://en.m.wikipedia.org/wiki/Communications_of_the_ACM
  • https://en.m.wikipedia.org/wiki/WordPress
  • https://en.m.wikipedia.org/wiki/Digital_rights_management
  • https://en.m.wikipedia.org/wiki/GNU_Compiler_Collection
  • https://en.m.wikipedia.org/wiki/Unix
  • https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy
  • https://foundation.wikimedia.org/wiki/...uage/Policy:Universal_Code_of_Conduct
  • https://developer.wikimedia.org
  • https://stats.wikimedia.org/#/en.wikipedia.org
  • https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement
  • https://www.mediawiki.org/
  • https://creativecommons.org/licenses/by-sa/4.0/deed.en
  • https://foundation.m.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use
  • https://en.m.wikipedia.org/wiki/Main_Page
  • https://en.m.wikipedia.org/wiki/Special:Random
  • https://en.m.wikipedia.org/wiki/Special:Nearby
  • https://donate.wikimedia.org/?wmf_sour...ipedia.org&uselang=en&wmf_key=minerva
  • https://en.m.wikipedia.org/wiki/Wikipedia:About
  • https://en.m.wikipedia.org/wiki/Wikipedia:General_disclaimer
  • https://en.m.wikipedia.org/wiki/Wikipedia:Citation_needed
  • https://en.m.wikipedia.org/wiki/ISSN_(identifier)
  • https://en.m.wikipedia.org/wiki/Microsoft_Windows
  • https://en.m.wikipedia.org/wiki/RAND_Corporation
  • https://en.m.wikipedia.org/wiki/Source_code
  • https://en.m.wikipedia.org/wiki/Operating_system
  • https://en.m.wikipedia.org/wiki/Wall_Street_Journal
  • https://en.m.wikipedia.org/wiki/PC_Magazine
  • https://en.m.wikipedia.org/wiki/DARPA
  • https://en.wikipedia.org/wiki/Wikipedia:Contact_us
  • https://en.m.wikipedia.org/wiki/Wayback_Machine
  • https://en.m.wikipedia.org/wiki/Wikipedia:Contents/Portals
  • https://en.m.wikipedia.org/wiki/PL/I
  • https://en.m.wikipedia.org/wiki/Proprietary_software
  • https://en.m.wikipedia.org/wiki/Compiler
  • https://en.m.wikipedia.org/wiki/Machine_code
  • https://en.m.wikipedia.org/wiki/Windows
  • https://en.m.wikipedia.org/wiki/C_(programming_language)
  • https://en.m.wikipedia.org/wiki/Key_(cryptography)
  • https://en.m.wikipedia.org/wiki/RSA_(cryptosystem)
  • https://en.m.wikipedia.org/wiki/Cryptosystem
  • https://en.m.wikipedia.org/wiki/Disassembler
  • https://en.m.wikipedia.org/wiki/Joomla
  • https://en.m.wikipedia.org/wiki/United_States_Air_Force
  • https://en.m.wikipedia.org/wiki/Turing_Award
  • https://en.m.wikipedia.org/wiki/Artificial_intelligence
  • https://en.m.wikipedia.org/wiki/Doi_(identifier)
  • https://en.m.wikipedia.org/wiki/ISBN_(identifier)
  • https://en.m.wikipedia.org/wiki/S2CID_(identifier)
  • https://en.m.wikipedia.org/wiki/Android_(operating_system)
  • https://en.m.wikipedia.org/wiki/1983_in_film
  • https://en.m.wikipedia.org/wiki/BBN_Technologies
  • https://www.wikimedia.org/
  • https://en.m.wikipedia.org/wiki/Software
  • https://en.m.wikipedia.org/wiki/Trojan_horse_(computing)
  • https://en.m.wikipedia.org/wiki/Copyright_infringement
  • https://en.m.wikipedia.org/wiki/Algorithm
  • http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
  • https://doi.org/10.1145%2F358198.358210
  • https://api.semanticscholar.org/CorpusID:34854438
  • https://en.m.wikipedia.org/wiki/Plausible_deniability
  • https://en.m.wikipedia.org/wiki/Plaintext
  • https://en.m.wikipedia.org/wiki/Intel_C%2B%2B_Compiler
  • https://en.m.wikipedia.org/wiki/ScreenOS
  • https://en.m.wikipedia.org/wiki/JavaScript
  • https://en.m.wikipedia.org/wiki/Wikipedia:No_original_research
  • https://en.m.wikipedia.org/wiki/ArXiv_(identifier)
  • https://arxiv.org/archive/cs.CR
  • https://en.m.wikipedia.org/wiki/IBM_PC_compatible
  • https://en.m.wikipedia.org/wiki/Patch_(computing)
  • https://en.m.wikipedia.org/wiki/Superuser
  • https://en.m.wikipedia.org/wiki/Reinforcement_learning
  • https://en.m.wikipedia.org/wiki/Interbase
  • https://en.m.wikipedia.org/wiki/Back_Orifice
  • https://en.m.wikipedia.org/wiki/Clipper_chip
  • https://en.m.wikipedia.org/wiki/Broadband
  • https://en.m.wikipedia.org/wiki/Electronic_Frontier_Foundation
  • https://en.m.wikipedia.org/wiki/Samsung
  • https://en.m.wikipedia.org/wiki/Portal:Business_and_economics
  • https://en.m.wikipedia.org/wiki/Encryption
  • https://en.m.wikipedia.org/wiki/George_Mason_University
  • https://en.m.wikipedia.org/wiki/System_administrator
  • https://en.m.wikipedia.org/wiki/Hacker_(computer_security)
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)
  • https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
  • https://en.m.wikipedia.org/wiki/Division_of_labour
  • https://en.m.wikipedia.org/wiki/Reverse_engineering
  • http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor
  • https://en.m.wikipedia.org/wiki/Booting
  • https://en.m.wikipedia.org/wiki/Microsoft_Outlook
  • https://en.m.wikipedia.org/wiki/Computer_worm
  • https://en.m.wikipedia.org/wiki/Ken_Thompson
  • https://en.m.wikipedia.org/wiki/Multics
  • https://en.m.wikipedia.org/wiki/Debugging
  • https://en.m.wikipedia.org/wiki/ZDNet
  • https://en.m.wikipedia.org/wiki/Commun...ns_Assistance_for_Law_Enforcement_Act
  • https://en.m.wikipedia.org/wiki/E-mail_spam
  • https://www.wsj.com/tech/cybersecurity...argeted-in-china-linked-hack-327fc63b
  • https://en.m.wikipedia.org/wiki/Proof_of_concept
  • https://en.m.wikipedia.org/wiki/Rootkit
  • https://en.m.wikipedia.org/wiki/Retrovirus
  • https://es.wikipedia.org/wiki/Puerta_trasera
  • https://en.m.wikipedia.org/wiki/Chipset
  • https://en.m.wikipedia.org/wiki/Object_code
  • https://en.m.wikipedia.org/wiki/WarGames
  • https://en.m.wikipedia.org/wiki/Crypto..._secure_pseudorandom_number_generator
  • https://en.m.wikipedia.org/wiki/Dual_EC_DRBG
  • https://en.m.wikipedia.org/wiki/Cryptovirology
  • https://en.m.wikipedia.org/wiki/Juniper_Networks
  • https://it.wikipedia.org/wiki/Backdoor
  • https://ar.wikipedia.org/wiki/%D8%A8%D...9%8A_(%D8%AD%D9%88%D8%B3%D8%A8%D8%A9)
  • https://az.wikipedia.org/wiki/Arxa_qap%C4%B1
  • https://bn.wikipedia.org/wiki/%E0%A6%A...%E0%A6%89%E0%A6%9F%E0%A6%BF%E0%A6%82)
  • https://bar.wikipedia.org/wiki/Hintatial
  • https://bs.wikipedia.org/wiki/Backdoor_(ra%C4%8Dunarstvo)
  • https://ca.wikipedia.org/wiki/Porta_del_darrere
  • https://cs.wikipedia.org/wiki/Zadn%C3%AD_vr%C3%A1tka
  • https://da.wikipedia.org/wiki/Bagd%C3%B8r_(malware)
  • https://eo.wikipedia.org/wiki/Malanta%C5%ADa_pordo_(komputiko)
  • https://eu.wikipedia.org/wiki/Atzeko_ate
  • https://fa.wikipedia.org/wiki/%D8%AF%D8%B1_%D9%BE%D8%B4%D8%AA%DB%8C
  • https://fr.wikipedia.org/wiki/Porte_d%C3%A9rob%C3%A9e
  • https://ko.wikipedia.org/wiki/%EB%B0%B1%EB%8F%84%EC%96%B4
  • https://id.wikipedia.org/wiki/Pintu_belakang_(komputer)
  • https://he.wikipedia.org/wiki/%D7%93%D..._%D7%90%D7%97%D7%95%D7%A8%D7%99%D7%AA
  • https://ka.wikipedia.org/wiki/Backdoor
  • https://lmo.wikipedia.org/wiki/Backdoor
  • https://ml.wikipedia.org/wiki/%E0%B4%A...%E0%B4%BF%E0%B4%82%E0%B4%97%E0%B5%8D)
  • https://nl.wikipedia.org/wiki/Achterdeurtje
  • https://ja.wikipedia.org/wiki/%E3%83%90%E3%83%83%E3%82%AF%E3%83%89%E3%82%A2
  • https://pl.wikipedia.org/wiki/Backdoor
  • https://pt.wikipedia.org/wiki/Backdoor
  • https://ro.wikipedia.org/wiki/U%C8%99%C4%83_secret%C4%83_(informatic%C4%83)
  • https://ru.wikipedia.org/wiki/%D0%91%D1%8D%D0%BA%D0%B4%D0%BE%D1%80
  • https://simple.wikipedia.org/wiki/Backdoor_(computing)
  • https://sk.wikipedia.org/wiki/Met%C3%B3da_tajn%C3%BDch_vchodov
  • https://ckb.wikipedia.org/wiki/%D9%BE%...%D8%B1%DA%A9%D8%A7%D8%B1%DB%8C%DB%8C)
  • https://sr.wikipedia.org/wiki/%D0%91%D0%B5%D0%BA%D0%B4%D0%BE%D1%80
  • https://fi.wikipedia.org/wiki/Takaovi
  • https://sv.wikipedia.org/wiki/Bakd%C3%B6rr
  • https://th.wikipedia.org/wiki/%E0%B8%9...9%E0%B8%AB%E0%B8%A5%E0%B8%B1%E0%B8%87
  • https://tg.wikipedia.org/wiki/%D0%91%D0%B5%D0%BA%D0%B4%D0%BE%D1%80
  • https://tr.wikipedia.org/wiki/Arka_kap%C4%B1
  • https://uk.wikipedia.org/wiki/%D0%91%D0%B5%D0%BA%D0%B4%D0%BE%D1%80
  • https://vi.wikipedia.org/wiki/Backdoor
  • https://zh-yue.wikipedia.org/wiki/Backdoor_(%E9%9B%BB%E8%85%A6)
  • https://zh.wikipedia.org/wiki/%E8%BB%9F%E9%AB%94%E5%BE%8C%E9%96%80
  • https://en.wikipedia.org/w/index.php?title=Backdoor_(computing)&action=edit
  • https://en.wikipedia.org/w/index.php?title=Backdoor_(computing)&oldid=1279816400
  • http://www.dwheeler.com/trusting-trust...l#2.Background%20and%20related%20work
  • http://www.catb.org/jargon/html/B/back-door.html
  • https://www.eff.org/deeplinks/2017/05/...-hazard-and-users-need-way-disable-it
  • https://www.howtogeek.com/334013/intel...ed-the-tiny-computer-inside-your-cpu/
  • https://techcrunch.com/2024/10/07/the-...-backdoor-law-that-came-back-to-bite/
  • https://www.pcmag.com/news/chinese-hac...y-breached-isps-including-att-verizon
  • https://www.wsj.com/livecoverage/harri...-trump-campaigns-Sfa6s0vIBEmEWOjeaZ8e
  • http://www.veracode.com/sites/default/...static-detection-of-backdoors-1.0.pdf
  • https://www.wired.com/threatlevel/2013/09/nsa-backdoor/
  • http://www.ibtimes.co.uk/hackers-using...dows-pcs-monero-mining-trojan-1627220
  • https://arstechnica.com/security/2017/...ws-boxes-can-now-be-remotely-removed/
  • https://doi.org/10.1016%2FS1363-4127%2801%2900405-8
  • https://search.worldcat.org/issn/1363-4127
  • https://www.infoworld.com/article/3167...ds-back-door-is-your-data-center.html
  • http://blog.erratasec.com/2012/05/bogus-story-no-chinese-backdoor-in.html
  • https://www.eff.org/deeplinks/2015/04/...ing-back-22-years-key-escrow-failures
  • https://ntv.ifmo.ru/file/article/21359.pdf
  • https://doi.org/10.17586%2F2226-1494-2022-22-4-742-750
  • https://search.worldcat.org/issn/2226-1494
  • https://api.semanticscholar.org/CorpusID:251940761
  • https://arxiv.org/abs/2007.10760
  • https://lore.kernel.org/lkml/20031105230350.GB12992@work.bitmover.com/
  • https://lwn.net/Articles/57135/
  • https://web.archive.org/web/20040216120134/http://lwn.net:80/Articles/57135/
  • http://www.securityfocus.com/news/7388
  • https://web.archive.org/web/2011070902...t.gov/publications/history/karg74.pdf
  • http://csrc.nist.gov/publications/history/karg74.pdf
  • http://www.acsac.org/2002/papers/classic-multics.pdf
  • https://doi.org/10.1109%2FCSAC.2002.1176285
  • https://www.theglobeandmail.com/techno...an-ontario-tech-firm/article16402341/
  • https://web.archive.org/web/2015022113...irology.com/cryptovfiles/newbook.html
  • http://www.cryptovirology.com/cryptovfiles/newbook.html
  • https://web.archive.org/web/2014100819.../html/wheeler-trusting-trust-ddc.html
  • http://www.dwheeler.com/trusting-trust.../html/wheeler-trusting-trust-ddc.html
  • https://research.swtch.com/nih
  • https://web.archive.org/web/2011010910...y.sophos.com/2009/08/18/compileavirus
  • https://nakedsecurity.sophos.com/2009/08/18/compileavirus
  • https://arstechnica.com/information-te...ious-xcodeghost-apps-haunt-app-store/
  • http://blog.sucuri.net/2014/03/unmasking-free-premium-wordpress-plugins.html
  • http://blog.sucuri.net/2014/04/joomla-plugin-constructor-backdoor.html
  • https://www.kb.cert.org/vuls/id/247371
  • http://www.cert.org/historical/advisories/CA-2001-01.cfm
  • https://arstechnica.com/security/2015/...or-password-in-juniper-firewall-code/
  • https://spece.it/bezpieczenstwo/zagrozenia-tygodnia-2015-w52
  • https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html
  • https://www.zdnet.com/article/backdoor...h-devices-from-chinese-vendor-c-data/
  • https://www.theregister.com/2024/03/29/malicious_backdoor_xz/
  • https://web.archive.org/web/2024040102...com/2024/03/29/malicious_backdoor_xz/
  • https://www.bleepingcomputer.com/news/...-xz-tools-used-by-most-linux-distros/
  • https://web.archive.org/web/2024032919...-xz-tools-used-by-most-linux-distros/
  • https://www.akamai.com/blog/security-r...door-xz-utils-discovered-what-to-know
  • https://web.archive.org/web/2024040201...door-xz-utils-discovered-what-to-know
  • https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
  • https://web.archive.org/web/2024040201...esam/223949d5a074ebc3dce9ee78baad9e27
  • https://www.wordfence.com/learn/finding-removing-backdoors/
  • http://learn-networking.com/network-se...rograms-that-still-serve-great-pranks
  • https://web.archive.org/web/2015052720...rograms-that-still-serve-great-pranks
  • http://www.2-spyware.com/backdoors-removal
  • https://web.archive.org/web/20051015042726/http://www.faqfarm.com/Q/FAQ/1772
  • https://www.owasp.org/images/a/ae/OWASP_10_Most_Common_Backdoors.pdf
  • https://en.m.wikipedia.org/wiki/Logging_(computer_security)
  • https://en.m.wikipedia.org/wiki/Easter_egg_(virtual)
  • https://en.m.wikipedia.org/wiki/Photomask
  • https://en.m.wikipedia.org/wiki/Intel_Active_Management_Technology
  • https://www.gnu.org/proprietary/malware-microsoft.en.html
  • https://en.m.wikipedia.org/wiki/CERT_Coordination_Center
  • https://en.m.wikipedia.org/wiki/Common_Vulnerability_Scoring_System
  • https://en.m.wikipedia.org/wiki/Obfuscation_(software)
  • https://en.m.wikipedia.org/wiki/Cloak_and_dagger
  • https://en.m.wikipedia.org/wiki/Generative_model
  • https://en.m.wikipedia.org/wiki/Remote_code_execution
  • https://en.m.wikipedia.org/wiki/XZ_Utils
  • https://en.m.wikipedia.org/wiki/Public_key_cryptography
  • https://en.m.wikipedia.org/wiki/Moti_Yung
  • https://en.m.wikipedia.org/wiki/Revision_control_system
  • https://en.m.wikipedia.org/wiki/Mydoom
  • https://en.m.wikipedia.org/wiki/Electronic_mail
  • https://en.m.wikipedia.org/wiki/Trapdoor_function
  • https://en.m.wikipedia.org/wiki/Smartcard
  • https://en.m.wikipedia.org/wiki/XZ_Utils_backdoor
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#
  • https://en.m.wikipedia.org/w/index.php...gin&returnto=Backdoor+%28computing%29
  • https://en.m.wikipedia.org/w/index.php...ons&returnto=Backdoor+%28computing%29
  • https://en.m.wikipedia.org/wiki/Talk:Backdoor_(computing)
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#p-lang
  • https://en.m.wikipedia.org/w/index.php?title=Backdoor_(computing)&action=edit
  • https://en.m.wikipedia.org/wiki/Home_router
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Eckersley-2017-1
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Hoffman-2017-2
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-3
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-4
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-5
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-6
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Wysopal-Eng-7
  • https://en.m.wikipedia.org/wiki/Hardware_backdoor
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Zetter-2013-8
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Ashok-2017-9
  • https://en.m.wikipedia.org/wiki/Backdo...ng)#cite_note-Microsoft-Back-Doors-10
  • https://en.m.wikipedia.org/wiki/Backdo...uting)#cite_note-Ars-Technica-2017-11
  • https://en.m.wikipedia.org/wiki/Backdo...e_note-Backdoors-and-Trojan-Horses-12
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Linthicum-13
  • https://en.m.wikipedia.org/wiki/Default_password
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Bogus-story-14
  • https://en.m.wikipedia.org/wiki/Backdo...uting)#cite_note-Clipper-a-failure-15
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Menisov-2022-16
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Overview
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Politics_and_attribution
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Examples
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Worms
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Object_code_backdoors
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Asymmetric_backdoors
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Compiler_backdoors
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Occurrences
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Countermeasures
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#List_of_known_backdoors
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#See_also
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#Notes
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#References
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#External_links
  • https://en.m.wikipedia.org/w/index.php...oor_(computing)&action=edit§ion=1
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Petersen-1967-17
  • https://en.m.wikipedia.org/wiki/Backdo...uting)#cite_note-Security-Controls-18
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-19
  • https://en.m.wikipedia.org/wiki/Hard_code
  • https://en.m.wikipedia.org/wiki/WOPR
  • https://en.m.wikipedia.org/w/index.php...oor_(computing)&action=edit§ion=2
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-20
  • https://en.m.wikipedia.org/wiki/Control_(management)
  • https://en.m.wikipedia.org/w/index.php...oor_(computing)&action=edit§ion=3
  • https://en.m.wikipedia.org/w/index.php...oor_(computing)&action=edit§ion=4
  • https://en.m.wikipedia.org/wiki/Sobig
  • https://en.m.wikipedia.org/wiki/Sony_BMG_CD_copy_prevention_scandal
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-McVoy-21
  • https://en.m.wikipedia.org/wiki/Backdo...)#cite_note-An-attempt-to-backdoor-22
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)#cite_note-Poulsen-2003-23
  • https://en.m.wikipedia.org/wiki/Backdo...g)#cite_note-SamsungGalaxyBackdoor-24
  • https://en.m.wikipedia.org/w/index.php...oor_(computing)&action=edit§ion=5
xhv:alternate
  • http://dev.restore.ovi.cnr.it:8890/abo...itle=Backdoor_(computing)&action=edit
  • https://en.m.wikipedia.org/w/index.php?title=Backdoor_(computing)&action=edit
xhv:icon
xhv:license
  • Deed - Attribution-ShareAlike 4.0 International - Creative Commons
xhv:stylesheet
  • http://dev.restore.ovi.cnr.it:8890/abo...=site.styles&only=styles&skin=minerva
  • http://dev.restore.ovi.cnr.it:8890/abo....client.init&only=styles&skin=minerva
primary topic
  • https://en.m.wikipedia.org/wiki/Backdoor_(computing)
Alternative Linked Data Views: Facets | iSPARQL | ODE     Raw Linked Data formats: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD
This material is Open Knowledge   W3C Semantic Web Technology     This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3231, on Linux (x86_64-generic_glibc25-linux-gnu), Single Edition