One of the most dangerous types of Trojan. Backdoors provide the author or operator of the Trojan with remote administration of a victim’s machine. Unlike legitimate remote administration utilities, they install, launch and run invisibly, without the consent or knowledge of the user. Once installed, backdoors can be instructed to send, receive, execute and delete files, harvest confidential data from the computer, log activity on the computer and more.