Rootkits

From CyberSecurity
Revision as of 05:26, 27 November 2005 by RaresMan (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
  • Updates
    • 11/26/05, Rares: Updated Main page with summary and latest draft


Paper will most likely focus on legitimate and illegitimate (aka criminal) uses of rootkits and the threats posed by activities from individuals or groups in both camps.


Paper Sections/Works in Progress, etc