Software  >   Malware  >  

Rootkits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Kernel Rootkits, Kernel Root Kits, Root Kits
DEFINITION: A collection of software tools that enable administrator-level access to a computer or computer network. Rootkits are installed on a computer after someone has obtained user-level access, either by exploiting a known vulnerability or cracking a password. Once installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the  … 
Definition continues below.
RootkitsWhite Papers (View All Report Types)
8 Matches
How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

The New Reality of Stealth Crimeware
sponsored by McAfee.
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

McAfee Initiative to Fight Cybercrime
sponsored by McAfee, Inc.
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

McAfee, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension
8 Matches
 
ROOTKITS DEFINITION (continued): … A collection of software tools that enable administrator-level access to a computer or computer network. Rootkits are installed on a computer after someone has obtained user-level access, either by exploiting a known vulnerability or cracking a password. Once installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network.Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement