Rootkits, the who's what's and whys in kitting the box
The idea of this guide is to make you aware of rootkits, what they can do, their history, and the varying different type of rootkits. I'm also going to discuss couple of possible countermeasures and steps that you can take to defend your self against rootkits.
A rootkit can be best described as a piece of software that functions at the lowest level of the Operating System infiltrating the kernel. Rootkitting is a technique that is often used by hackers and virus creators to hide files and and processes that their intrusion creates. This technology has also been used by manufacturers to hide digital right management software, and one of the best known cases of this was Sony.
Everyone can fall foul to rootkit's, however step's can betaken to protect yourself. Some can be employed by using plain and simple common sense, some by the community, and some by think about security when installing and preparing your base install.
These threats are as real for Windows as they are for Linux. Rootkit's can be broken down into a number of different categories, and as technology has grown so has the number of differing kit types.
- Login or register to post comments
- Printer-friendly version
- 1895 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago