Rootkits
Malware
Internet protocols
Internet standards
Computer security
Backdoor
Secure Shell
Hacker
Telnet
System software
Computing
Software