Frontpage
Back

Navigation

Kernel Rootkits and Countermeasures

Rootkits allow attackers to take complete control of a computer. We describe the tricks intruders use to gain access to the Linux kernel and provide guidelines on hardening the kernel against such attacks.

Kernel Rootkits and Countermeasures

Copyright © 2011 eZ Systems AS (except where otherwise noted). All rights reserved.
Visit: mobile site | full site