Sidebar: A Simple Rootkit Example
An important element of a kernel rootkit is its ability to hide itself and cover up what is really going on. Here's one way that some rootkits do that. When a rootkit is installed, it replaces certain system calls and utilities with its own, modified versions of those routines.
For example, to hide the existence of a file, the rootkit must intercept all system calls that can carry a file name argument, such as open(), chdir() and unlink().
By Russell Kay at Computer World
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.