---

SearchOpenSource: Rootkit Levels of Infection and Mitigation

[ Thanks to Jane Walker for this link.
]

“Hackers don many disguises in order to sneak past IT security
guards. The rootkit, one of the most effective disguises, not only
masks the intruder, but covers his trail.

“The rootkit’s origins are deeply rooted in early methods of
‘backdooring’ Unix-based workstations and servers. Current examples
encompass a variety of functions and features that further improve
upon existing methods (where they don’t redefine them
outright)…”


Complete Story

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis