Difference between revisions of "Rootkits"

From CyberSecurity
Jump to: navigation, search
 
Line 1: Line 1:
 
Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
 
Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.
 +
 +
 +
 +
Paper Sections/Works in Progress, etc
 +
 +
Section 1
 +
Section 2
 +
Section 3
 +
Section 4 - Responses
 +
Section 5
 +
 +
See the discussion Tab where I accidentally posted most everything -Jameel

Revision as of 22:49, 19 November 2005

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc

Section 1 Section 2 Section 3 Section 4 - Responses Section 5

See the discussion Tab where I accidentally posted most everything -Jameel