1 |
RootkitType of malicious software that when installed without authorization, is able to conceal its presence and gain administrative control of a computer system.
|
2 |
RootkitA software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system.
|
3 |
RootkitA collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
|
4 |
RootkitA rootkit is a type of malicious software that is activated each time your system boots up. Rootkits are difficult to detect because they are activated before your system's Operating System has c [..]
|
5 |
Rootkita program (or combination of several programs) designed to take fundamental control (in Unix terms “root” access, in Windows terms “Administrator” access) of a computer system, without authorization b [..]
|
6 |
RootkitA malware program that is designed to take full control of the machine’s operating system.
|
7 |
Rootkitis a type of stealth malware designed to hide its own existence from detection. Because of this, rootkits are often extremely difficult to remove, and often necessitate completely wiping the hard driv [..]
|
8 |
RootkitA rootkit is a clandestine type of malware that hides itself within operating system kernels or application binaries. Rootkits present more of a threat than ordinary viruses which attack garden variet [..]
|
9 |
Rootkitrootkit is a type of malicious software that is activated each time your system boots up. Rootkits are generally difficult to detect, since they run before the Operating System has completely booted u [..]
|
10 |
RootkitA software system that consists of one or more programs designed to obscure the fact that a system has been compromised.
|
11 |
Rootkita concealed set of tools on your computer which allow a hacker to continue accessing your system after it has been initially breached; rootkits are often installed at a very base technical level of yo [..]
|
12 |
RootkitA rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to “hide in plain [..]
|
13 |
RootkitA program designed to hide objects such as processes, files or Windows registry entries
|
14 |
RootkitTrojan Horse software that captures passwords and message traffic to and from a computer
|
15 |
RootkitA rootkit is a set of little programs used to install files and software which can no be detected by the user. Rootkits are mainly used by hackers, e.g. to collect information from a computer, such as [..]
|
16 |
RootkitThe name for a kit of hacker utilities place on a UNIX machine after a hacker breaks in. A typical rootkit includes: password sniffer log cleaners replacement binaries for common programs on th [..]
|
17 |
RootkitA type of malware (malicious software) that gives an unauthorized user access to a computer or device. Once installed, the rootkit can take steps to hide its presence on the device.
|
18 |
RootkitA collection of programs that a hacker uses to disguise his attack and to obtain administrator rights for a computer or a network.
|
19 |
RootkitA rootkit is a malicious piece of software that enables administrator access to an unauthorised user of a computer without being detected.
|
20 |
RootkitA program that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection. Once a program has gained access, it can be used to monitor traffic and keystrokes; create a backdoor into the system for the hacker's use; alter log files; attack other machines on the network; and alter existin [..]
|
21 |
RootkitA rootkit is a piece of software that hides programs or processes running on a computer. It can be used to conceal computer misuse or data theft.
|
22 |
RootkitA rootkit is software used by a hacker to gain constant administrator-level access to a computer or network. A rootkit is typicially installed through a stolen password or by exploiting a system vulne [..]
|
23 |
RootkitA hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is [..]
|
<< ROC | Router >> |