Rootkits

From CyberSecurity
Revision as of 05:57, 3 November 2005 by Gmusick (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.