In our previous article, we discussed current rootkit development techniques. In this article, we take it a step further and focus upon upcoming, cutting edge trends in rootkit technologies. Then the third and final article in this series will discuss various methods of rootkit detection and countermeasures that can be used by security professionals.
Thursday, November 17, 2005
Windows rootkits in 2005, part two:
Right, but what about the experiences that Mozilla chooses to default for users like switching to Yahoo and making that the default upon ...
via VMware blog
Intrusion Detection with Tripwire : "Do this by adding a comma after the severity= line and putting emailto= on the next line, followe...
Its crazy that the stats for this blog show that there were about a 100 visitors today. I haven't posted in a long time. Blogger really...