Backdoor computing is the proccess of intentionally creating vulnerability within a computer system or software application. The backdoor allows authorized and unauthorized users to bypass standard security measures and gain access to the system. Software developers create backdoors for legitimate purposes, such as debugging or providing remote access. However, backdoor computing is a security risk since it can compromise the integrity of a system. Hackers use backdoor attacks for unauthorized access, surveillance, data theft, or launching cyber-attacks.