The term rootkit is used to describe the mechanisms and techniques where malicious programs, including viruses, spyware and trojans, try to hide from antivirus and antispyware programs. There are various categories of rootkits depending on whether the malicious program continues to exist after restarting the computer and whether the rootkit program operates at the user or kernel level.
A permanent rootkit is associated with a malicious program that is activated every time the computer starts. Since such a code must be activated automatically whenever the computer starts or when the user logs on, the code must be stored in a permanent location on the computer, such as the Registry Start-up or the file system, and find a way to activate itself without user intervention. Continue reading “What is a rootkit – Types of rootkits”
In Greek Mythology, the Trojan Horse was a seemingly innocuous but treacherous gift from the Greeks to the Trojans. During the siege of Troy, an enormous wooden horse was left by the Greek army outside the gates of the city. The Greeks had sailed away as if they had retreated. The Trojans, believing the horse to be a religious offering, brought it into the city. Greek soldiers then emerged from their hiding place within the hollow horse and opened the city gates to enable the rest of the Greek army to enter and capture the city. Continue reading “Trojan Horse – Mythology or Reality ?”
I was reading an article the other day stating that a computer directly connected to the Internet without any protection (firewall, antivirus etc) will be hacked in less than 10 minutes. To resist the million attacks that your home computer will receive when connected to the Internet “jungle”, I would recommend the following security protection mechanisms: Continue reading “What can happen to an unprotected home computer”