"Hackers don many disguises in order to sneak past IT security
guards. The rootkit, one of the most effective disguises, not only
masks the intruder, but covers his trail.
"The rootkit's origins are deeply rooted in early methods of
'backdooring' Unix-based workstations and servers. Current examples
encompass a variety of functions and features that further improve
upon existing methods (where they don't redefine them
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.