Rootkits

Results: 310



#Item
61Cyberwarfare / Computer security / Ifconfig / Password / Hacker / Network security / Rootkits / Trojan horses / System software / Computing / Malware

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
62Espionage / Sony / Rootkits / Digital rights management / Extended Copy Protection / Compact Disc and DVD copy protection / Spyware / Copy protection / System software / Software / Malware

The BAck Page 80  Computerworld  November 14, 2005 fran k hayes n

Add to Reading List

Source URL: www.tabpi.org

Language: English - Date: 2007-08-14 08:09:00
63Linux kernel / Monolithic kernels / Computer security / Malware / Rootkit / Kernel / Loadable kernel module / Hooking / Ring / System software / Software / Computer architecture

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
64Inchoate offenses / Conspiracy / Botnets / Rootkits / Zeus

Case Study: ZeuS & Money Mule Ring Source: http://krebsonsecurity.comcharged-in-zeus-money-mule-ring And http://krebsonsecurity.comzeus-trojan-gang-faces-justice/ This story relates to the activities

Add to Reading List

Source URL: www.int-comp.org

Language: English - Date: 2014-11-28 05:00:36
65Rootkits / Malware / Chkrootkit / Hacker / Computer virus / Loadable kernel module / Kernel / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / System software / Computer security / Cyberwarfare

Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2004-08-12 13:59:29
66

Protección de endpoints Antivirus y antispyware Elimina todos los tipos de amenazas, incluyendo virus, rootkits, gusanos y spyware. Exploración opcional basada en la nube:

Add to Reading List

Source URL: www.eset-la.com

Language: Spanish - Date: 2015-03-04 15:55:19
    67Nuclear program of Iran / Rootkits / Stuxnet / Malware / Duqu / Microsoft Security Essentials / Framework Programmes for Research and Technological Development / Cyberwarfare / System software / Software

    SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE

    Add to Reading List

    Source URL: www.syssec-project.eu

    Language: English - Date: 2013-01-30 16:47:51
    68Digital rights management / Software / Copyright law / Proprietary software / End-user license agreement / Free software / Windows Media DRM / Rootkits / Extended Copy Protection / Software licenses / Law / Computer law

    NOTICE SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (“THIS AGREEMENT”) IS A LEGAL AND BINDING AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR ENTITY) AND TP VISION NETHERLANDS B.V. A DU

    Add to Reading List

    Source URL: www.tpvision.com

    Language: English - Date: 2015-03-16 15:11:34
    69Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software

    “Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:36
    70Malware / Nuclear program of Iran / Rootkits / Stuxnet / Computer virus / Spyware / System software / Espionage / Cyberwarfare

    PDF Document

    Add to Reading List

    Source URL: callicoonfinearts.com

    Language: English - Date: 2014-12-19 14:09:19
    UPDATE