Rootkit

Results: 605



#Item
321Windows NT architecture / Svchost.exe / Malware / Service Control Manager / Session Manager Subsystem / Windows Registry / Rootkit / Environment variable / Windows service / Microsoft Windows / System software / Computing

S A N S D F I R C urriculum

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-14 15:52:44
322System software / Computer security / Rootkit / Spyware / Secure Shell / Duqu / Backdoor / Espionage / Malware / Cyberwarfare

 Unveiling “Careto” - The Masked APT Version 1.0 TLP: GREEN

Add to Reading List

Source URL: kasperskycontenthub.com

Language: English - Date: 2014-03-27 15:13:52
323Espionage / Botnet / Malware / Spyware / Computer virus / Denial-of-service attack / Rootkit / Storm botnet / Network security / Computer network security / Cyberwarfare / Computer security

Practical  Computer  Security  for  Writers   By   J.T.  Evans   http://jtevans.net/   Protecting  Your  Data,  Files,  Work  and  (in  some  cases)  Livelihood  

Add to Reading List

Source URL: jtevans.net

Language: English - Date: 2012-06-19 16:36:21
324Computer security / Malware / Social engineering / Scareware / Avira / Rootkit / Computer virus / Norton AntiVirus / System software / Antivirus software / Software

PC-Gaming-infographic-FINAL

Add to Reading List

Source URL: www.webroot.com

Language: English - Date: 2014-08-04 15:57:09
325Monolithic kernels / Central processing unit / Ring / Kernel / Linux kernel / Operating system / Hypervisor / Xen / Rootkit / System software / Computer architecture / Software

Efficient Monitoring of Untrusted Kernel-Mode Execution Abhinav Srivastava and Jonathon Giffin School of Computer Science, Georgia Institute of Technology {abhinav,giffin}@cc.gatech.edu Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2011-05-09 09:06:24
326Computer security / Hacking / Malware / Rootkit / Windows NT / Windows Server / Hacker / Microsoft SQL Server / Application security / Computing / Software / Microsoft Windows

Hacking / Hacking Exposed Windows: Windows Security Secrets and Solutions, Third Edition / Scambray, Andrews[removed]X AT A GLANCE ▼ ▼ ▼

Add to Reading List

Source URL: www.mhprofessional.com

Language: English - Date: 2008-02-25 10:40:32
327Antivirus software / Internet / Rogue software / Computer network security / Rootkit / Web threat / Spam / Spyware / AVG Technologies / Malware / System software / Computing

AVG Community Powered Threat Report – Q4 2011

Add to Reading List

Source URL: aa-download.avg.com

Language: English - Date: 2012-01-23 13:02:12
328Malware / Search algorithms / Cryptography / Polymorphic code / Obfuscation / Rootkit / Obfuscated code / Hash table / Computer virus / Computer programming / Computing / Software engineering

Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 08:33:00
329Computer security / Computer virus / Malware / Avira / Rootkit / Avast! / Antivirus software / System software / Software

Dr.  Craig  Wright      GSE  GSM  GSC  LLM    [removed]     Just  running  an  Anti-­‐Virus    program  is  no  longer  enough.  You  n

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:05
330Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-14 15:52:44
UPDATE