Microsoft Malware Protection Center: Know your enemy - protect yourself
By msft-mmpc
19 Oct 2012

Of the many weapons and tricks in an attacker's arsenal, none is more dangerous or insidious than the ability to hide and continuously compromise a system from within. This is the role of a rootkit. Malware uses rootkits, or rootkit functionality, in order to hide their presence on an affected computer and thus impede their removal. Once compromised by a rootkit, any information returned by an affected system can no longer be trusted and must be regarded as suspect (which is exactly how they hide themselves and their components from you - by modifying requests for information that might give them away).

Click the URL above to read the full article
Comments: 0
Votes:32