Abstract :
One of the greatest threats computer and network users face today is a hacker gaining root-level access to a system. This, in essence, gives the intruder administrative control over the machine and thus a golden opportunity to cause problems. With this in mind, attackers are increasingly using rootkits, a collection of tools they can install on a victim´s computer to gain administrative access.
Keywords :
computer crime; computer networks; computer viruses; administrative control; computer network hackers; root-level access; Application software; Communication system control; Computer hacking; Computer security; Control systems; Information security; Kernel; Operating systems; Payloads; Software systems; Hackers; Rootkits; Security;