Rootkits

From CyberSecurity
Revision as of 04:16, 27 November 2005 by RaresMan (talk | contribs)

Jump to: navigation, search

Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc

See the discussion Tab where I accidentally posted most everything -Jameel
I posted the summary under a link in this page and formatted it properly - Rares