Persistence Mechanisms and Backdoor Implementation