Language Selection

English French German Italian Portuguese Spanish

Rootkit levels of infection and mitigation

Filed under
HowTos

Hackers don many disguises in order to sneak past IT security guards. The rootkit, one of the most effective disguises, not only masks the intruder, but covers his trail.

The rootkit's origins are deeply rooted in early methods of "backdooring" Unix-based workstations and servers. Current examples encompass a variety of functions and features that further improve upon existing methods (where they don't redefine them outright). Today, the term rootkit is divorced from operating system dependency. While a strong security implementation can help mitigate the effectiveness of rootkit installation, removal of such malware is -- unfortunately -- an inexact science, and usually requires a drive format and full re-installation of the original operating system to ensure a clean and proper restoration.

Understanding this basic principle illustrates precisely why attempts to remove a determined rootkit can be impractical. The very tools used to identify such threats are susceptible to direct manipulation by these threats. One such popular tool used for rootkit detection is chkrootkit[1], which can currently identify 60 known Linux-based rootkits.

Full Story.

More in Tux Machines

Ubuntu 14.10 Released, openSUSE GNOME Peek, and Debian Multimedia

ubuntuThe release of Ubuntu 14.10, codenamed Utopic Unicorn, was the big news today. But in other news, Kostas Koudaras has a sneak peek of GNOME in upcoming openSUSE 13.2 and Alessio Treglia shared some bits on Debian 8.0 multimedia. Miguel de Icaza announces Mono for the Unreal Engine and, finally, Erich Schubert says avoiding systemd isn't hard at all. Read more

eBay joins open-source community with ultra-fast OLAP engine for Hadoop

Like arch-rival Amazon.com, the soon-to-split eBay Inc. is something of an oddity in that it hasn’t historically been a big contributor to the open-source community. But the e-commerce pioneer hopes to change that with the release of the source-code for a homegrown online analytics processing (OLAP) engine that promises to speed up Hadoop while also making it more accessible to everyday enterprise users. Read more

DHS report makes recommendations for greater open source software use in government

A report commissioned by the Homeland Security Department's Science and Technology Directorate say barriers to using and developing open source software must be addressed as IT budgets across government continue to tighten. Read more

Calculate Linux Provides Consistency by Design

Calculate Linux has a rather interesting strategy for desktop environments. It is characterized by two flavors with the same look and feel. That does not mean that the inherent functionality of the KDE and Xfce desktops are compromised. Rather, the Calculate Linux developers did what you seldom see within a Linux distribution with more than one desktop option: They unified the design. Read more