作者: Lynn Erla Beegle
DOI: 10.1080/10658980701402049
关键词:
摘要: A rootkit is cloaked software that infiltrates an operating system or a database with the intention to escape detection, resist removal, and perform specific operation. Many rootkits are designed invade "root," kernel, of program, therefore operate without announcing their presence owner computer. Although some written noble intentions (e.g., strengthen anti-virus package), true have malicious purpose. infection can render compromised computer vulnerable attacks corruption. Rootkits named for origin in Linux systems, but number attack Microsoft systems has recently proliferated. Not only difficult detect assess, at times effective way remove them do clean installation entire system. Recent discoveries other venues prove problem spreading major concern administrators information security. This paper presents brief history development possible effects.Prominent cases involving described.The concludes overview methods prevent (hopefully) eradicate one infected