User`s guide

ZyWALL IDP 10 User’s Guide
59 Chapter 6 IDP Policies
Figure 32 Worm/Virus Signatures
6.3.8 Backdoor/Trojan
A backdoor (also called a trapdoor) is hidden software or a hardware mechanism that can be
triggered
to gain access to a program, online service or an entire computer system. A Trojan
horse is a harmful program that s hidden inside apparently harmless programs or data.
To find a list of all backdoor/Trojan related signatures supported by the ZyWALL, do a policy
search by name or policy query by type (Backdoor/Trojan). The following screen shows
some of the backdoor/Trojan related signatures supported by the ZyWALL at the time of
writing.