This document discusses backdoor Trojans and how they can bypass authentication to gain unauthorized access to a computer system. Backdoor Trojans are classified as viruses that create a backdoor to access a specific system. They do not spread to other files. Common backdoors take the form of installed programs or subvert the system through a rootkit. Backdoors can enable harmful actions like crashing the computer, data theft, keylogging, and linking the computer to a botnet. Popular backdoor Trojans mentioned include Netbus, Subseven, Back Orifice, Beast, and Zeus. Detecting backdoors is challenging as they can modify object code rather than just source code. Analysis of running processes and any open