A program that is used to compromise a Windows machine. It installs itself as a server, allowing a hacker with the client counterpart to manipulate the machine more completely than the user at the keyboard. Named as a play on BackOffice, an earlier Microsoft software suite, Back Orifice was created for Windows 95 and 98, and Back Orifice 2000 (BO2K) for Windows NT and subsequent Windows operating systems.Back Orifice was created by "The Cult of the Dead Cow" (cDc), a hacker organization (www.cultdeadcow.com). There are various "BO removers," which are programs that detect and remove it. See BO remover, Trojan and RAT. See also back office.
Applies to a remote administration tool permitting system administrators to control a computer from a remote location, typically across the Internet. It was released in 1998 by a hacker club named Cult of the Dead Cow (cDc), and a year later, the group released a newer version called BO2K, or Back Orifice 2000. The problem with Back Orifice is that it can be distributed by crackers via a Trojan horse, leaving the target unsuspecting that anything is wrong. After being installed, the Trojan allows almost complete control by the remote cracker over the target’s computer. Note that Back Orifice is not a virus. Rather, the software has to be willingly accepted and run by its host before it can be used. Back Orifice is often distributed on the claim that it is something else—such as valid software that the user might receive by email or download from a Website. The best way to prevent being targeted for a crack attack is to not accept files from untrusted sources. Stirk, A. Back Orifice. [Online, 2004.] IRCHELP Organization Website. http://www.irchelp.org/irchelp/security/bo.html.