Rootkits

From CyberSecurity
Revision as of 22:40, 25 November 2005 by Jalsalam (talk | contribs)

Jump to: navigation, search

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc

See the discussion Tab where I accidentally posted most everything -Jameel