SearchOpenSource: Rootkit Levels of Infection and Mitigation
Dec 06, 2005, 07:30 (0 Talkback[s])
(Other stories by Ed Tittel, Justin Korelc)
[ Thanks to Jane Walker for this link.
"Hackers don many disguises in order to sneak past IT security
guards. The rootkit, one of the most effective disguises, not only
masks the intruder, but covers his trail.
"The rootkit's origins are deeply rooted in early methods of
'backdooring' Unix-based workstations and servers. Current examples
encompass a variety of functions and features that further improve
upon existing methods (where they don't redefine them