文件名称:
Professional Rootkits
开发工具:
文件大小: 7mb
下载次数: 0
上传时间: 2010-04-15
详细说明: Hacker Defender, HE4Hook, Vanquish, NT Rootkit, FU, AFX Rootkit-these are the names of some of the rootkits that have found their way into millions of computers around the world. These rootkits share many similarities. Each was written by a single programmer or at best a few programmers. Each can provide unauthorized access to information. Each uses some form of stealth to avoid detection, and they all use technology not intended for their purpose. What is the purpose of a rootkit? Many exist for the sole purpose of programmer recognition. Some find use as “botnet” clients that can work together to overload a particular site. Some end up distributing the spam we find in our e-mail every morning. Some provide conduits to otherwise secure networks. Others are used to gather our personal information for fun and profit. These purposes limit the final product to what I will term “casual software”-more precisely, software limited by purpose, where that purpose is illegal, unethical, destructive, or simply unprofitable. Software developed under these guises cannot usually garner the tools, materials, and expertise required to produce commercial-grade software. This book looks beyond the casual rootkit into the emerging field of professional rootkits. Webster defines “professional” as characterized by or conforming to the technical or ethical standards of a profession. In this case, the profession is software engineering, where the technical and ethical standards maintained by professional software engineers can produce commercial-grade products with capabilities far beyond those of a single programmer working in his or her spare time on an illegal or unprofitable project. In the case of rootkits, a well-funded team of professionals can exploit a broad range of technology to produce full-featured, robust software with extensive capabilities that are each fit-for-purpose. Here we are again, back at purpose. Only now, with Professional Rootkits, the purpose is information leak prevention, content monitoring and filtering, copyright infringement prevention, or any similar need funded by a multimillion-dollar industry. These industries are looking for solutions, and some of those solutions require the stealth and functionality that can only be found in Professional Rootkits. ...展开收缩
(系统自动生成,下载前可以参看下载内容)
下载文件列表
相关说明
- 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
- 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。
- 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
- 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
- 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
- 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.