Linux Today: Linux News On Internet Time.

More on LinuxToday

SearchOpenSource: Rootkit Levels of Infection and Mitigation

Dec 06, 2005, 07:30 (0 Talkback[s])
(Other stories by Ed Tittel, Justin Korelc)

WEBINAR: On-demand Event

Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >

[ Thanks to Jane Walker for this link. ]

"Hackers don many disguises in order to sneak past IT security guards. The rootkit, one of the most effective disguises, not only masks the intruder, but covers his trail.

"The rootkit's origins are deeply rooted in early methods of 'backdooring' Unix-based workstations and servers. Current examples encompass a variety of functions and features that further improve upon existing methods (where they don't redefine them outright)..."

Complete Story

Related Stories: