Details

Rootkits For Dummies


Rootkits For Dummies


1. Aufl.

von: Larry Stevenson, Nancy Altholz

19,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 11.12.2006
ISBN/EAN: 9780470101834
Sprache: englisch
Anzahl Seiten: 380

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected. <p>Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.</p> <p>Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes.</p> <p><b>Note:</b> CD-ROM/DVD and other supplementary materials are not included as part of eBook file.</p>
<b>Introduction.</b> <p><b>Part I: Getting to the Root of Rootkits.</b></p> <p>Chapter 1: Much Ado about Malware.</p> <p>Chapter 2: The Three Rs of Survivable Systems.</p> <p><b>Part II: Resistance Is NOT Futile.</b></p> <p>Chapter 3: Practicing Good Computer Hygiene.</p> <p>Chapter 4: Staying Secure Online.</p> <p>Chapter 5: Patching and Updating Your System and Software.</p> <p>Chapter 6: Blurring the Lines of Network Security.</p> <p><b>Part III: Giving Rootkits the Recognition They Deserve.</b></p> <p>Chapter 7: Getting Windows to Lie to You: Discovering How Rootkits Hide.</p> <p>Chapter 8: Sniffing Out Rootkits.</p> <p>Chapter 9: Dealing with a Lying, Cheating Operating System.</p> <p><b>Part IV: Readying for Recovery.</b></p> <p>Chapter 10: Infected! Coping with Collateral Damage.</p> <p>Chapter 11: Preparing for the Worst: Erasing the Hard Drive.</p> <p><b>Part V: The Part of Tens.</b></p> <p>Chapter 12: Ten (Plus One) Rootkits and Their Behaviors.</p> <p>Chapter 13: Ten (Plus Two) Security Sites That Can Help You.</p> <p><b>Appendix: About the CD.</b></p> <p><b>Index.</b></p>
<b>Larry Stevenson</b> is a veteran security consultant and instructor. <p><b>Nancy Altholz</b> is a Microsoft Security MVP and security expert. Both are associated with CastleCops.com, a resource for security professionals.</p>
<b>Recognize rootkits and plan your counter-attack</b> <p><b>Here's how to root out this malicious software and manage damage control</b></p> <p>Rootkits are diabolical, virtually invisible ways for someone to hijack your data, computer, or worse — your entire network. But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.</p> <p><b>Discover how to</b></p> <ul> <li>Identify types of rootkits</li> <li>Keep your computer clean</li> <li>Root out invasive software</li> <li>Protect your system with regular updates</li> <li>Plan for recovery</li> <li>Recognize when you have to start over</li> </ul> <p><b>All on the bonus CD-Rom</b></p> <p><b>CD includes</b></p> <ul> <li> <div>Anti-malware utilities and scanners</div> </li> <li> <div>Backup and imaging applications</div> </li> <li> <div>System analysis programs</div> </li> <li> <div>Rootkit-detection-and-removal applications</div> </li> <li> <div>Password protectors and generators</div> </li> </ul> <p>For details and complete system requirements, see the CD-ROM appendix</p>

Diese Produkte könnten Sie auch interessieren:

Symbian OS Explained
Symbian OS Explained
von: Jo Stichbury
PDF ebook
32,99 €
Symbian OS Internals
Symbian OS Internals
von: Jane Sales
PDF ebook
56,99 €
Parallel Combinatorial Optimization
Parallel Combinatorial Optimization
von: El-Ghazali Talbi
PDF ebook
120,99 €