Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Other Computer Engineering
A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg
A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg
Theses and Dissertations
In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we cannot trust the information within our computer systems then we cannot properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent …