How do I check my computer on rootkits?

Experts generally agree that it is difficult to estimate how many computers are endangered by harmful rootkits, but the numbers seem to be on if the growing list of well -known rootkites is a hint. Infections in the US are considered the highest, according to at least one estimate, up to one computer of every four infected. Unfortunately, it is not easy to detect rootkit, because one of its main features is to remain hidden. Software packages called "Anti-Rootkits" are available for Rootkits scanning, but prevention is strongly recommended.

In some cases, there may be signs that rootkit is present in the system. For example, a user can perform text processing or simple surfing on the Internet when he notices that the computer is processing the data extremely slow. After checking the system, it may be clarified that the computer for processing (CPU) has low sources. This could be because the CPU does against the background of work for rootkit. Poorly written rootkitm can also cause repeatedly disruption PCustoms, although these problems can also be attributed to other causes.

If you want to be safe, it's best to check the computer per week on rootkits, and then back up a clean system to ensure future problems. Some anti-rootkit packages offer to remove certain types of rootkites, but it is generally recommended that rootkit be found, the hard disk is reformatted and the system is rebuilt. It is very difficult to make sure that rootkit is completely removed, and in some cases it can remove the rootkit in the "holes" system, which is unstable.

There are several types of rootkits and not all scanning programs are looking for all Rootkits. Anti-rootkits based on signatures is looking for familiar rootkits, which can be useful if your system is infected with a well-known set, but the new rootkits are released every day into nature. Another anti-rootkits program Look for rootkits in files, but not in the registry.

Anti-rootkit software from an untrustworthy source could actually be designed to install rootkit rather than scan one, so it is wise to stick to programs issued by well-known software companies that specialize in security software. Several popular anti-rootkite programs that fall into this category include AVG Anti-Rotkit , f-Secure's blacklight , sophos anti-rootkit a Panda's anti-rootkit .

In April 2007 PC Magazine ™ tested and reviewed several anti-rootkit programs for efficiency. The Editor's choice went to Panda's anti-rootkit , which was reported as immersion deeper into the system than the other rootkit search engines checked at that time. Panda Anti-Rootkit also found all the planted roots in the test and, like many other anti-rootkites, is free. The use of more than one Anti-Rootkit program can also be cautious.

sensual protocol that needs to beKeep it is scanatrootkits every week, then clone the hard disk or back up the system on the image located on the secondary unit. Using this strategy, if rootkit should be found, you do not have to rely on removal. The recent disk image allows you to reformat the infected unit and then restore the image to ensure a clean and stable small downtime system.

To avoid downloading rootkits, avoid opening an email that comes from unknown sources, maintain the operating system with the latest hotfixes, and run antivirus and anti-Spyware programs with current updates. If you want to minimize the risk, use the firewall, and don't allow the website to install software if you are not sure that the site can be trusted.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?