A rootkit is a type of malicious software that gives the hacker
"root" or administrator access to your network. They are activated
before your system's operating system has completely booted up,
making them extremely difficult to detect. Rootkits allow hackers
to install hidden files, processes, and hidden user accounts.
Hackers can use them to open back doors in order to intercept data
from terminals, connections, and keyboards. A rootkit hacker can
gain access to your systems and stay there for years, completely
Learn from respected security experts and Microsoft Security
MVPs how to recognize rootkits, get rid of them, and manage damage
Accompanying the book is a value-packed companion CD offering a
unique suite of tools to help administrators and users detect
rootkit problems, conduct forensic analysis, and make quick
Note: CD-ROM/DVD and other supplementary materials are
not included as part of eBook file.