{"id":26308,"date":"2022-04-19T15:09:00","date_gmt":"2022-04-19T13:09:00","guid":{"rendered":"https:\/\/perseus.de\/backdoor\/"},"modified":"2026-03-27T16:25:37","modified_gmt":"2026-03-27T15:25:37","slug":"backdoor","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/backdoor\/","title":{"rendered":"Backdoor"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26308\" class=\"elementor elementor-26308 elementor-22113\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Backdoor<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e947052 e-flex e-con-boxed e-con e-parent\" data-id=\"2e947052\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4161f315 e-con-full e-flex e-con e-child\" data-id=\"4161f315\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><p>Ce terme signifie \u00ab porte d\u00e9rob\u00e9e \u00bb et d\u00e9signe un acc\u00e8s alternatif \u00e0 un logiciel ou \u00e0 un ordinateur. Une porte d\u00e9rob\u00e9e peut \u00eatre int\u00e9gr\u00e9e \u00e0 un programme par un \u00e9diteur de logiciels l\u00e9gitime, par exemple pour pouvoir acc\u00e9der au programme \u00e0 la demande du client en cas d&rsquo;oubli du mot de passe. En tant que logiciel malveillant, une porte d\u00e9rob\u00e9e permet aux cybercriminels d&rsquo;acc\u00e9der \u00e0 un ordinateur ou \u00e0 un r\u00e9seau. Ils peuvent ainsi contr\u00f4ler un ordinateur, le verrouiller, crypter ses donn\u00e9es, manipuler les saisies ou espionner. Souvent, un programme de porte d\u00e9rob\u00e9e s&rsquo;introduit dans le syst\u00e8me via un cheval de Troie.    <\/p><h4> <\/h4><h4>Que signifie exactement le terme \u00ab backdoor \u00bb ?<\/h4><div> <\/div><ul><li>M\u00eame si une porte d\u00e9rob\u00e9e int\u00e9gr\u00e9e \u00e0 un logiciel l\u00e9gitime peut avoir une utilit\u00e9 pratique, elle repr\u00e9sente un risque pour la s\u00e9curit\u00e9.<br>Un programme de type porte d\u00e9rob\u00e9e peut \u00eatre install\u00e9 avec un cheval de Troie ou se faire passer pour un cheval de Troie. C&rsquo;est pourquoi les mesures de s\u00e9curit\u00e9 visant \u00e0 pr\u00e9venir les chevaux de Troie sont \u00e9galement utiles contre les programmes de type porte d\u00e9rob\u00e9e. <\/li><li>Si un cheval de Troie a install\u00e9 un programme de porte d\u00e9rob\u00e9e, ce dernier reste actif m\u00eame si le cheval de Troie est d\u00e9tect\u00e9 et supprim\u00e9.<\/li><li>M\u00eame pour des programmeurs exp\u00e9riment\u00e9s, il peut \u00eatre difficile de d\u00e9tecter une porte d\u00e9rob\u00e9e dans le code source d&rsquo;un logiciel. Conform\u00e9ment au principe des \u00ab nombreux yeux \u00bb, les logiciels libres sont consid\u00e9r\u00e9s comme plus s\u00fbrs \u00e0 cet \u00e9gard (mais pas comme infaillibles !), car ils sont soumis \u00e0 un examen critique par de nombreux programmeurs. <\/li><li> <\/li><\/ul><h4>Dans quelles situations suis-je confront\u00e9 \u00e0 des portes d\u00e9rob\u00e9es dans mon travail quotidien ?<\/h4><div> <\/div><p>En ouvrant la pi\u00e8ce jointe d&rsquo;un e-mail frauduleux, vous risquez d&rsquo;installer involontairement un programme de type \u00ab porte d\u00e9rob\u00e9e \u00bb sur votre ordinateur. Cela peut passer inaper\u00e7u dans un premier temps, par exemple si le programme sert \u00e0 espionner des donn\u00e9es et des mots de passe. Ou s&rsquo;il met en place une porte d\u00e9rob\u00e9e en vue d&rsquo;une attaque de chantage qui aura lieu ult\u00e9rieurement.  <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><div> <\/div><ul><li>De nombreuses mesures visant \u00e0 renforcer la cybers\u00e9curit\u00e9 contribuent \u00e9galement \u00e0 emp\u00eacher l&rsquo;installation d&rsquo;un programme de type \u00ab porte d\u00e9rob\u00e9e \u00bb. Parmi celles-ci, on peut citer :<br>l&rsquo;utilisation d&rsquo;un antivirus r\u00e9guli\u00e8rement mis \u00e0 jour <\/li><li>N&rsquo;installez que des logiciels et des mises \u00e0 jour provenant de sources v\u00e9rifi\u00e9es ; pour cela, acc\u00e9dez manuellement au site web du fabricant si n\u00e9cessaire<\/li><li>Une approche tr\u00e8s prudente vis-\u00e0-vis des e-mails, en particulier des liens et des pi\u00e8ces jointes qu&rsquo;ils contiennent<\/li><li>Utilisation d&rsquo;un pare-feu pour emp\u00eacher l&rsquo;acc\u00e8s \u00e0 une \u00e9ventuelle porte d\u00e9rob\u00e9e.<\/li><\/ul><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e4b62 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d7e4b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Backdoor Ce terme signifie \u00ab porte d\u00e9rob\u00e9e \u00bb et d\u00e9signe un acc\u00e8s alternatif \u00e0 un logiciel ou \u00e0 un ordinateur. Une porte d\u00e9rob\u00e9e peut \u00eatre int\u00e9gr\u00e9e \u00e0 un programme par un \u00e9diteur de logiciels l\u00e9gitime, par exemple pour pouvoir acc\u00e9der au programme \u00e0 la demande du client en cas d&rsquo;oubli du mot de passe. En [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26308","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backdoor - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backdoor - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Backdoor Ce terme signifie \u00ab porte d\u00e9rob\u00e9e \u00bb et d\u00e9signe un acc\u00e8s alternatif \u00e0 un logiciel ou \u00e0 un ordinateur. Une porte d\u00e9rob\u00e9e peut \u00eatre int\u00e9gr\u00e9e \u00e0 un programme par un \u00e9diteur de logiciels l\u00e9gitime, par exemple pour pouvoir acc\u00e9der au programme \u00e0 la demande du client en cas d&rsquo;oubli du mot de passe. En [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T15:25:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Backdoor\",\"datePublished\":\"2022-04-19T13:09:00+00:00\",\"dateModified\":\"2026-03-27T15:25:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/\"},\"wordCount\":497,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/\",\"name\":\"Backdoor - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:09:00+00:00\",\"dateModified\":\"2026-03-27T15:25:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/backdoor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backdoor - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/backdoor\/","og_locale":"fr_FR","og_type":"article","og_title":"Backdoor - Perseus Technologies","og_description":"Backdoor Ce terme signifie \u00ab porte d\u00e9rob\u00e9e \u00bb et d\u00e9signe un acc\u00e8s alternatif \u00e0 un logiciel ou \u00e0 un ordinateur. Une porte d\u00e9rob\u00e9e peut \u00eatre int\u00e9gr\u00e9e \u00e0 un programme par un \u00e9diteur de logiciels l\u00e9gitime, par exemple pour pouvoir acc\u00e9der au programme \u00e0 la demande du client en cas d&rsquo;oubli du mot de passe. En [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/backdoor\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:09:00+00:00","article_modified_time":"2026-03-27T15:25:37+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/backdoor\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Backdoor","datePublished":"2022-04-19T13:09:00+00:00","dateModified":"2026-03-27T15:25:37+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/"},"wordCount":497,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/backdoor\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/backdoor\/","url":"https:\/\/perseus.de\/fr\/backdoor\/","name":"Backdoor - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:09:00+00:00","dateModified":"2026-03-27T15:25:37+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/backdoor\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/backdoor\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Backdoor"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26308"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26308\/revisions"}],"predecessor-version":[{"id":26309,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26308\/revisions\/26309"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}