"...it cloaks itself by burrowing deep inside a server's
processor and availing itself of debugging mechanisms available in
Intel's chip architecture. The rootkit, in other words, mimics a
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.