Thursday, August 9, 2007

What rootkits are and how to fight them

Papers by Job Function, Industry, Company  |  Newsletters  |  Top Search Terms

Editor's Picks If you're still a little fuzzy about what rootkits are, here's a quick explanation from TechRepublic contributor Mike Mullins: "To clarify, a rootkit is not an exploit -- it's the code or program an attacker leaves behind after a successful exploit." Learn more about rootkits in these blog posts:

Windows rootkits 101 (Mike Mullins)

UNIX/Linux rootkits 101 (Chad Perrin)

Rootkits 201 (Chad Perrin)

Then, read industry research about rootkits, as well as other security topics.

Rootkits: What They Are and How to Fight Them (Webroot Software)

Rootkits - The New Wave of Invisible Malware is Here (Trend Micro)

The Art of Rootkits (Infosecwriters.com)

Rootkits: The Growing Threat (McAfee)

When Malware Meets Rootkits (Symantec)

TechNet Webcast: Rootkits in Windows (Level 300) (Microsoft)

Rootkit Evasiveness: Malware's Best Friend, Windows' Worst Foe (Agnitum)

Linux RootKits For Beginners - From Prevention to Removal (SANS Institute)

Detect rootkits and rootkit behavior with these techniques (Addison Wesley Professional)

Rootkits: Digital Rights Management, Spyware, and Security (Institute of Electrical and Electronics Engineers)

Recently added security papers

The 2007 Security Threat Report (Sophos Software)

10 Steps To Secure Your SQL Server (Idera)

Outbound E-mail and Content Security in Today's Enterprise, 2007 (Proofpoint)

Anti-spam Defense: Is a Second Layer of Spam Protection Right for You? (Proofpoint)


Newsletters Automatically sign up for related newsletters

Security Solutions - Get hands-on advice for locking down your systems.

IT Security NetNote - Receive a roundup of the latest security alerts, fixes, and tricks.

Top Search Terms

1. Service Level Agreement

2. CCNA

3. ITIL change management

4. Excel-based project management spreadsheet

5. Keyboard shortcuts

6. Project Management

7. ITIL

8. Local Area Networks LAN

9. IT project management

10. pmbok

See More Search Terms
Focus on Defragmentation

Explore Research Areas
DATA MANAGEMENT Data Infrastructure, Data Tools, More...
DESKTOPS, LAPTOPS and OS Client System Hardware, Components, Desktop Client OS, Handhelds, Portable Device Client, More...
ENTERPRISE APPLICATIONS Customer Management, Enterprise Planning, Workflow Management, More...
IT MANAGEMENT Business Functions, IT Budgeting, IT Infrastructure, Project Management, Regulatory Compliance, User Satisfaction, More...
NETWORKING and COMMUNICATIONS LAN - WAN, Mobile and Wireless, Network Management, Network Technologies, Telecommunications, More...
PROFESSIONS and INDUSTRIES Government, Homeland Security, Education, Financial Services, More...
SECURITY Authentication - Encryption, Intrusion - Tampering, Security Administration, More...
SERVERS and SERVER OS Server Hardware, Server Platforms - OS, More...
SOFTWARE and WEB DEVELOPMENT E-commerce - E-Business, Internet and Web, Software Development Tools, More...
STORAGE Management, Storage Hardware, More...

Copyright © 2007 CNET Networks, Inc. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc.
CNET Networks, Inc.
235 Second Street
San Francisco, CA 94105
U.S.A.