Abstract

Rootkits are quickly emerging as the largest threat towards computer security. A rootkit is malicious software that alters the underlying operating system to remain hidden indefinitely. While remaining hidden, a rootkit can carry out any number of tasks under the complete control of a hacker or malicious user. Although rootkits do present a huge threat towards computer security, there are several ways to prevent and detect rootkit installation. This article discusses the many ways in which rootkits attempt to alter the operating system, remain hidden, and carry out malicious tasks. In addition, this study shows what system administrators and everyday users can do to increase their security toward malicious software, as well as detect the presence of an installed rootkit.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call