[color=lime]Please have Adobe Reader installed or another PDF reader. Here is the link to Adobe for the reader http://get.adobe.com/reader/?promoid=BUIGO[/color]
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.
Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.
Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
From the Back Cover
Recognize rootkits and plan your counter-attack
Here's how to root out this malicious software and manage damage control
Rootkits are diabolical, virtually invisible ways for someone to hijack your data, computer, or worse — your entire network. But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.
Discover how to
* Identify types of rootkits
* Keep your computer clean
* Root out invasive software
* Protect your system with regular updates
* Plan for recovery
* Recognize when you have to start over
All on the bonus CD-Rom
Anti-malware utilities and scanners
Backup and imaging applications
System analysis programs
Password protectors and generators