What is rootkit?
Rootkit is a set of software tools that provide remote access to resources, files and system information without knowing the owner when installing on a computer. Cerimation and parental "nanny programs" use different types of rootkits to secretly track activity on computers for supervision purposes, but harmful hackers can also install rootkits on unsuspecting victims. Linux and Berkeley (BSD) distribution are UNIX derivatives. The UNIX "root" level resembles the privileges of Windows manager. The remote control software package was referred to as "set", which gave us "rootkit" sometimes written as a "root set".
rootkits have been creating buzzing since the beginning of the 90's. The Rootkits type that attacks Windows ™ machines is inserted into the OS core. Hence Rootkit can modify the operating system itself and capture the call to the system (information requirements), which provides false answers to masking the presence of rootkit. Because rootkit hides itsProcesses before the operating system and system protocols, it is difficult to detect them.
malicious hacker can get rootkit on the computer by different means. Rootkits can be delivered in a Trojan or even tucked in a seemingly benign file. It can be a graphics or a stupid program distributed via e -mail. The victims do not have a way to find out that Rootkit will be installed by clicking on graphics or program. Rootkits can also be installed by surfing on the web. For example, a pop -up window may indicate that the program is necessary for correct viewing of the web and masking Rootkit as a legitimate plugin.
Once Rootkit is installed, hacker can secretly communicate with a targeted count whenever he is online. Rootkit is usually used to install multiple hidden programs and create a "rear door" into the system. If the hacker wants information, the keylogger program can be installed. This program secretlyIt will record everything the victims of the type, online and off, and deliver the results to the interloder on the next occasion. Keylogger programs can detect usernames, passwords, credit card numbers, bank account numbers, and other sensitive data that sets a victim for potential fraud or identity theft.
Other harmful use for rootkits includes compromising several hundred or even hundreds of thousands of computers to create a remote "rootkit network" called botnet . Botnets are used to send distributed attacks to reject the service (DDOS), spam, viruses and Trojan horses to other computers. This activity, if traced back to the sender, can potentially lead to the legal seizure of computers from innocent owners who did not know that their computer was used by illegal purposes.
To help protect against rootkits, experts advise that security software will be maintained up to date, including antivirus and anti-spyware. Once available, install hotfixes (repair of the operating system) and fry the spam without opening it. When surfing over the Internet, only trusted sites allow you to install software and avoid clicking on unknown banners or pop -up windows. Even the "No" button can be Rootkit's trick.
It is also wise to use one or more software programs Anti-Rootkit to scan rootkits a week and then back up the system. Although some rootkits may be reportedly removed safely, the general recommendation is to reformat the drive and rebuild the system to make sure that the whole rootkit and all its processes are gone. If this happens, a recent, clean deposit will make work easier.