Difference between revisions of "Rootkits"

From CyberSecurity
Jump to: navigation, search
Line 5: Line 5:
 
Paper Sections/Works in Progress, etc
 
Paper Sections/Works in Progress, etc
  
*[[Rootkits_Notes | Rootkit Notes ]]<br>
+
*[[Rootkits_Notes | Rootkit Notes ]]
 +
* [[summary | Summary / Worklow]]
 +
** Section 1
 +
** Section 2
 +
** Section 3
 +
** [[Rootkits_Sec4_Draft | Section 4 - Responses ]]
 +
** Section 5
 +
* Research Links
  
* [[summary | Summary / Worklow]]
 
* Section 1
 
* Section 2
 
* Section 3
 
* [[Rootkits_Sec4_Draft | Section 4 - Responses ]]
 
* Section 5
 
  
 
See the discussion Tab where I accidentally posted most everything -Jameel<br>
 
See the discussion Tab where I accidentally posted most everything -Jameel<br>
 
I posted the summary under a link in this page and formatted it properly - Rares<br>
 
I posted the summary under a link in this page and formatted it properly - Rares<br>

Revision as of 04:20, 27 November 2005

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc


See the discussion Tab where I accidentally posted most everything -Jameel
I posted the summary under a link in this page and formatted it properly - Rares