Rootkits For Dummies

Rootkits For Dummies
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 24,95 €

Jetzt 19,99 €* E-Book

Artikel-Nr:
9780470101834
Veröffentl:
2007
Einband:
E-Book
Seiten:
380
Autor:
Larry Stevenson
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

A rootkit is a type of malicious software that gives the hacker "e;root"e; or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected. Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control. Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
A rootkit is a type of malicious software that gives the hacker"root" or administrator access to your network. They are activatedbefore your system's operating system has completely booted upmaking them extremely difficult to detect. Rootkits allow hackersto install hidden files, processes, and hidden user accounts.Hackers can use them to open back doors in order to intercept datafrom terminals, connections, and keyboards. A rootkit hacker cangain access to your systems and stay there for years, completelyundetected.Learn from respected security experts and Microsoft SecurityMVPs how to recognize rootkits, get rid of them, and manage damagecontrol.Accompanying the book is a value-packed companion CD offering aunique suite of tools to help administrators and users detectrootkit problems, conduct forensic analysis, and make quicksecurity fixes.Note: CD-ROM/DVD and other supplementary materials arenot included as part of eBook file.
Introduction.Part I: Getting to the Root of Rootkits.Chapter 1: Much Ado about Malware.Chapter 2: The Three Rs of Survivable Systems.Part II: Resistance Is NOT Futile.Chapter 3: Practicing Good Computer Hygiene.Chapter 4: Staying Secure Online.Chapter 5: Patching and Updating Your System and Software.Chapter 6: Blurring the Lines of Network Security.Part III: Giving Rootkits the Recognition TheyDeserve.Chapter 7: Getting Windows to Lie to You: Discovering HowRootkits Hide.Chapter 8: Sniffing Out Rootkits.Chapter 9: Dealing with a Lying, Cheating Operating System.Part IV: Readying for Recovery.Chapter 10: Infected! Coping with Collateral Damage.Chapter 11: Preparing for the Worst: Erasing the Hard Drive.Part V: The Part of Tens.Chapter 12: Ten (Plus One) Rootkits and Their Behaviors.Chapter 13: Ten (Plus Two) Security Sites That Can Help You.Appendix: About the CD.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.