Rootkit

Results: 605



#Item
571Linux kernel / Cross-platform software / Ksplice / Rootkit / Kernel / Loadable kernel module / Patch / Operating system / Architecture of Windows NT / Software / Computing / System software

Ksplice: Automatic Rebootless Kernel Updates Jeff Arnold and M. Frans Kaashoek Massachusetts Institute of Technology

Add to Reading List

Source URL: www.ksplice.com

Language: English - Date: 2013-04-02 12:01:37
572Rootkit / Ring / BIOS / Advanced Micro Devices / X86 / Interrupt flag / Computer architecture / System Management Mode / Interrupts

Crucial Security Programs Ring -1 vs. Ring -2: Containerizing Malicious SMM

Add to Reading List

Source URL: www.vodun.org

Language: English - Date: 2010-03-24 10:51:27
573Computing / Linux kernel / Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Rootkit / Integrity / Vmlinux / Loadable kernel module / Computer security / Security / Trusted computing

USENIX Association Proceedings of the

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2004-07-27 13:47:41
574Disk encryption / Malware / Trusted Platform Module / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / Rootkit / Computer worm / Computer security / Trusted computing / Cryptography

Cloaking Malware with the Trusted Platform Module Alan M. Dunn

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-06-21 00:49:25
575Antivirus software / Malware / Computer network security / Dropbox / Rootkit / Cloud computing / Internet security / Ransomware / Rogue security software / Software / System software / Computing

Security Threat Report 2013

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2013-02-01 09:46:40
576Computer network security / Malware / Antivirus software / Rootkit / EC-Council / Hacking tool / Computer virus / Denial-of-service attack / Hacker / Cyberwarfare / Computer security / System software

Page 1 EC-Council Certified

Add to Reading List

Source URL: www.rhythexconsultingghana.com

Language: English - Date: 2013-06-19 06:20:37
577Malware / Computer security / Rootkits / Kernel / Hooking / Operating system / Ring / System call / Windows API / System software / Software / Computing

WHITE PAPER: SYMANTEC SECURITY RESPONSE Windows Rootkit

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2006-03-26 10:01:13
578Copyright law / Digital rights management / Rootkits / Sony / Gartner / Sony BMG / Extended Copy Protection / Sony BMG copy protection rootkit scandal / Electronics / Technology / Electronic engineering

G00136331 Sony BMG DRM a Public-Relations and

Add to Reading List

Source URL: www.gartner.com

Language: English - Date: 2013-05-15 19:42:14
579Windows Server / Trusted computing / Hypervisor / X86 virtualization / Hardware virtualization / Rootkit / Ring / Xen / Paravirtualization / System software / Software / Virtual machines

A Hypervisor-Based System for Protecting Software Runtime Memory and Persistent Storage Prashant Dewan↑, David Durham↑, Hormuzd Khosravi↑, Men Long↑, Gayathri Nagabhushan⊥ ↑: Communications Technology Lab, Intel Corporation; ⊥: Software Solutions Group, Intel Corporation

Add to Reading List

Source URL: vodun.org

Language: English - Date: 2008-12-16 10:36:09
580Computer network security / Spamming / Computer security / Botnets / Malware / Rootkit / Computer virus / Trojan horse / Storm botnet / Computing / Multi-agent systems / Cyberwarfare

Malware Analysis Report Botnet: ZeroAccess/Sirefef February 2012

Add to Reading List

Source URL: www.kindsight.net

Language: English - Date: 2012-02-24 16:07:42
UPDATE