Register now or log in to join your professional community.
Its a common method used by hackers to access data in a server by avoiding the authentication step . Method starts by installing a daemon service on the host server that gives acces to remote user skipping the authentication process.
Back orifice is a very famous tool which got into controversy for this reason.
An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.