10 АНГЛІЙСЬКА КНИЖКИ ПОВ'ЯЗАНІ ІЗ «ROOTKIT»
Дізнайтеся про вживання
rootkit з наступної бібліографічної підбірки. Книжки пов'язані зі словом
rootkit та короткі уривки з них для забезпечення контексту його використання в англійська літературі.
1
The
Rootkit Arsenal: Escape and Evasion
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available.
2
Rootkits: Subverting the Windows Kernel
Rootkit.com founder reveals never-before-told offensive aspects of rootkit technology.
Greg Hoglund, James Butler, 2006
3
The
Rootkit Arsenal: Escape and Evasion in the Dark Corners ...
This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available.
But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.
Larry Stevenson, Nancy Altholz, 2006
5
The
Rootkit Arsenal: Escape and Evasion in the Dark Corners ...
This book covers more topics, in greater depth, than any other currently available.
6
Windows Forensic Analysis DVD Toolkit
To put our netstat example in the context of a user-mode rootkit, rather than
replacing the netstat command itself, a user-mode rootkit will hook Windows API
function calls so that the functions themselves do not return a complete listing of
all ...
7
Managed Code Rootkits: Hooking into Runtime Environments
Management development scenarios, tools like ReFrameworker, and countermeasures are covered, making this book a one stop shop for this new attack vector.
8
Security Awareness: Applying Practical Security in Your World
When and how should I install Windows patches? This text is designed to help students understand the answers to these questions through a series of real-life user experiences.
9
Penetration Tester's Open Source Toolkit
This was, of course, a rootkit. Specifically, it was a variant on TDSS and was used
to compromise a number of systems. 4.3.2.1.4 Status Many people use social
networks to provide status updates on what they're doing on a day-to-day or ...
This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits.
НОВИНИ ІЗ ТЕРМІНОМ «ROOTKIT»
Дізнайтеся, що обговорювала національна та міжнародна преса, і як термін
rootkit вживається в контексті наступних новин.
Hacking Team's malware uses a UEFI rootkit to survive operating …
Trend Micro found details about the UEFI rootkit in the more than 400GB worth of files and emails that were leaked recently from Milan-based Hacking Team by ... «PCWorld, Липень 15»
Proof-of-concept rootkit proves malware can hide on graphics chips
A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that ... «Techworld.com, Травень 15»
Proof-of-concept GPU rootkit hides in VRAM, snoops system activities
A team of coders have published a new “educational” rootkit, dubbed Jellyfish, that's virtually undetectable by current software practices. Their work is designed ... «ExtremeTech, Травень 15»
Sneaky Linux malware comes with sophisticated custom-built rootkit
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for ... «PCWorld, Лютий 15»
Thunderstrike - new Mac "ueberrootkit" could own your Apple forever
Generally speaking, any rootkit installed or activated at stage 3 or 4 above can be detected using regular and well-documented programming techniques. «Naked Security, Січень 15»
Researchers expect surge of rootkits targeting 64-bit PCs
Following a downward trend during the past two years, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, ... «PCWorld, Червень 14»
Anti-virus firm finds alleged Kremlin cyberweapon, undetected for at …
But what makes the Uroburos rootkit stand out from the crowd is that G Data's detailed report into the malware reveals that their researchers believe it to have ... «Graham Cluley Security News, Березень 14»
Gameover malware tougher to kill with new rootkit component
A new variant of the Gameover malware that steals online banking credentials comes with a kernel-level rootkit that makes it significantly harder to remove, ... «PCWorld, Лютий 14»
Is this Russia's Stuxnet? Security firm spots suspicious 'Uroburos …
'Uroburos' is an advanced rootkit that has been infecting networks since as far back as 2011, quietly stealing data after setting up rogue P2P networks within its ... «Techworld.com, Лютий 14»
New version of Gozi financial malware bundles MBR rootkit
Sophisticated malware that uses MBR rootkit components, like TDL4, also known as Alureon or TDSS, are part of the reason why Microsoft built the Secure Boot ... «PCWorld, Квітень 13»