A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.
In computing, a core dump (more properly a memory dump or storage dump) consists of the recorded state of the working memory of acomputer program at a specific time, generally when the program has terminated abnormally (crashed).[1] The name comes from the days when magnetic core memory was used, before the introduction of semiconductor memory; the name has remained established in systems inspired by UNIX long after the technology had faded from use. In practice, other key pieces of program state are usually dumped at the same time, including the processor registers, which may include the program counter and stack pointer, memory management information, and other processor and operating system flags and information. Core dumps are often used to assist in diagnosing and debugging errors in computer programs.
On many operating systems, a fatal error in a program automatically triggers a core dump; by extension the phrase "to dump core" has come to mean, in many cases, any fatal error, regardless of whether a record of the program memory results.