Rootkits For DummiesJohn Wiley & Sons, 2006-12-11 - 380 psl. A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected. Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control. Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. |
Turinys
7 | |
Part II Resistance Is NOT Futile | 35 |
Part III Giving Rootkits the Recognition They Deserve | 149 |
Part IV Readying for Recovery | 301 |
Part V The Part of Tens | 335 |
Appendix About the CD | 355 |
365 | |
Bonus Chapter 1 Ten Plus Three Malware Utilities and Scanners | 389 |
Bonus Chapter 2 Ten Plus Four More Utilities | 401 |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
active adware anti-malware anti-rootkit anti-spyware AntiHookExec antivirus APIs applications automatically Autoruns autostart backdoor backup blackhat Bonus Chapter boot bootable CD browser button CastleCops choose click OK command Configuration create DarkSpy DART CD database delete detect disable disk DKOM Double-click Dummies e-mail entries Event Log Event Viewer files folder Forum Freeware function GMER HackerDefender hackers hard drive hardware Here’s hidden hide HijackThis hooking host IceSword infected install Internet Explorer ISO image kernel kernel-mode rootkits keyloggers logon malware menu Microsoft Update monitor operating system option packet passwords Port Explorer Process Explorer reboot Registry remove restore point right-click rootkit Rootkit Revealer router Safe mode scan scanners server settings software firewall spyware SSDT startup Success Audit Sysinternals System Restore threat trojan utility Windows Update Windows XP