Rootkit

Results: 605



#Item
561Multi-agent systems / Computer security / Spamming / Denial-of-service attacks / Botnet / Malware / Denial-of-service attack / Rootkit / Transmission Control Protocol / Computer network security / Computing / Cyberwarfare

Festi  botnet  analysis  and  investigation   Aleksandr  Matrosov,  Eugene  Rodionov   Keywords: Festi, spam, botnet, rootkit, DDoS, OOP, HIPS, firewall

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2012-11-27 10:18:00
562Computing / System Management Mode / Rootkit / Non-maskable interrupt / X86 virtualization / BIOS / Hypervisor / Keystroke logging / Interrupt flag / Computer architecture / System software / Interrupts

SMM Rootkits: A New Breed of OS Independent Malware Shawn Embleton

Add to Reading List

Source URL: www.eecs.ucf.edu

Language: English - Date: 2008-07-15 11:25:37
563Malware / Antivirus software / Surveillance / Computer security / Rootkits / Keystroke logging / Sony BMG copy protection rootkit scandal / Spyware / Computer virus / Espionage / System software / Cyberwarfare

® White Paper

Add to Reading List

Source URL: www.trlokom.com

Language: English - Date: 2006-07-05 15:46:28
564Cyberwarfare / Trojan horses / Computer security / Rootkit / Alureon / Windows API / Unified Extensible Firmware Interface / Dropper / System software / Software / Malware

The Evolution of TDL: Conquering x64 Revision 1.1

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-07-01 12:26:46
565Antivirus software / Rootkits / Computer security / Spyware / Computer virus / Diff / Windows Registry / BartPE / Sony BMG copy protection rootkit scandal / System software / Software / Malware

WHITEPAPER: SYMANTEC SECURITY RESPONSE A Testing Methodology

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2007-10-19 11:54:31
566Smartphones / Information appliances / Malware / Android Market / Symbian / Android / Mobile operating system / Rootkit / Tablet computer / Software / Computing / Technology

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1

Add to Reading List

Source URL: www.seg.inf.uc3m.es

Language: English - Date: 2013-10-24 17:11:35
567Computer security / Rootkits / Trojan horses / Antivirus software / Keystroke logging / Computer virus / Alureon / Extended Copy Protection / System software / Cyberwarfare / Malware

ZeroAccess – an advanced kernel mode rootkit Marco Giuliani

Add to Reading List

Source URL: pxnow.prevx.com

Language: English - Date: 2011-04-11 05:28:59
568Software / Booting / Rootkit / Advanced Configuration and Power Interface / Power-on self-test / Intel Core / BIOS / System software / Computing

CORE SECURITY TECHNOLOGIES © 2009 Persistent BIOS Infection

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
569Disk encryption / Malware / Rootkit / Trusted Platform Module / Trusted Computing Group / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Windows Vista / Computer security / Cyberwarfare / Trusted computing

Stopping Rootkits at the Network Edge January 2007

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-06-08 19:45:53
570Booting / Boot loaders / BIOS / Disk file systems / NTLDR / Windows Vista startup process / Rootkit / TrueCrypt / Windows startup process / System software / Software / Microsoft Windows

Stoned Bootkit Your PC is now Stoned!

Add to Reading List

Source URL: www.stoned-vienna.com

Language: English - Date: 2009-08-16 07:58:23
UPDATE