期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Kernel Rootkits Implement and Detection 被引量:2
1
作者 li xianghe zhang liancheng li shuo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1473-1476,共4页
Rootkits, which unnoticeably reside in your computer, stealthily carry on remote control and software eavesdropping, are a great threat to network and computer security. It's time to acquaint ourselves with their imp... Rootkits, which unnoticeably reside in your computer, stealthily carry on remote control and software eavesdropping, are a great threat to network and computer security. It's time to acquaint ourselves with their implement and detection. This article pays more attention to kernel rootkits, because they are more difficult to compose and to be identified than useland rootkits. The latest technologies used to write and detect kernel rootkits, along with their advantages and disadvantages. 展开更多
关键词 ROOTKIT kernel rootkits rootkit detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部