Rootkit Get Started
Bring yourself up to speed with our introductory content
Evaluate Rootkit Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn to apply best practices and optimize your operations.
A rootkit was found and you think you've removed it, but how do you confirm it? Enterprise threats expert Nick Lewis explains the next steps to ensure rootkit removal. Continue Reading
Problem Solve Rootkit Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
Nick Lewis reviews the top three technologies used by hackers to cover their tracks after a network intrusion. Continue Reading
Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions. Continue Reading