Notizia Precedente
Notizia Successiva
RunWithParameters v1.0b2

F-Secure BlackLight 2.1.1012

Naviga SWZ: Home Page » News
News del 17 Luglio 05 Autore: Antares
F-Secure BlackLight 2.1.1012
Visto il proliferare di questa nuova generazione di trojan denominati Rootkit si stanno diffondendo sempre più questi tool di rimozione: questo è sviluppato dai laboratori F-Secure, produttori del famoso antivirus. Programma gratuito con scadenza prefissata (con questa versione al 01/10/05): chi lo ha precedentemente scaricato lo deve aggiornare obbligatoriamente perché il precedente scadeva il primo luglio"What is a rootkit? The term rootkit is very old and is dated back to the days when UNIX ruled the world. Rootkits for the UNIX operating system were typically used to elevate the privileges of a user to the root level (=administrator). This explains the name of this category of tools. Rootkits for Windows work in a different way and are typically used to hide malicious software from for example an antivirus scanner. Rootkits are typically not malicious by themselves but are used for malicious purposes by viruses, worms, backdoors and spyware. A virus combined with a rootkit produces what was known as full stealth viruses in the MS-DOS environment. How dangerous is a rootkit? The rootkit itself does typically not cause deliberate damage. Its purpose is to hide software. But rootkits are used to hide malicious code. A virus, worm, backdoor or spyware program could remain active and undetected in a system for a long time if it uses a rootkit. The malware may remain undetected even if the computer is protected with state-of-the-art antivirus. And the antivirus can't remove something that it can't see. The threat from modern malware combined with rootkits is very similar to full stealth viruses that caused a lot of headache during the MS-DOS era. All this makes rootkits a significant threat. How common is the problem? There are currently several spyware programs and viruses that use rootkits to hide. There are also a couple of publicly reported intrusions where rootkits have been used (for example the theft of the Half-Life 2 source code). Rootkits are already quite common in spyware programs but not as common in viruses. There is clear evidence that rootkits is a technique that works in practice. But the actual threat is still small compared to the potential of this technique. "
Inserisci un commento sul forum Commenta la News sul Forum


Categoria: Sicurezza

Licenza: Freeware

Dimensioni: 590KB

OS: Win All

La Community di

La community con le risposte che cerchi ! Partecipa é gratis !
Iscrizione ForumIscriviti al Forum


Vuoi ricevere tutti gli aggiornamenti di SWZone direttamente via mail ?
Iscrizione NewsletterIscriviti alla Newsletter

Carico il Player Video