When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Rootkit - Wikipedia

    en.wikipedia.org/wiki/Rootkit

    Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment.

  3. GMER - Wikipedia

    en.wikipedia.org/wiki/GMER

    GMER is a software tool written by a Polish researcher Przemysław Gmerek, for detecting and removing rootkits. [1] [2] It runs on Microsoft Windows and has support for Windows NT, 2000, XP, Vista, 7, 8 and 10. With version 2.0.18327 full support for Windows x64 is added. [3] [4] [5]

  4. Torpig - Wikipedia

    en.wikipedia.org/wiki/Torpig

    Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit card information.

  5. Carrier IQ - Wikipedia

    en.wikipedia.org/wiki/Carrier_IQ

    IQ Agent is software, typically pre-installed on mobile devices by handset manufacturers or network operators, designed to gather, store and forward diagnostic measurements on their behalf. Data available can include metrics on the device itself (e.g., firmware, battery levels , application performance, web performance) and performance data on ...

  6. Alureon - Wikipedia

    en.wikipedia.org/wiki/Alureon

    Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking usernames and passwords, credit card data, PayPal information, social security numbers, and other sensitive user data. [1]

  7. Bifrost (Trojan horse) - Wikipedia

    en.wikipedia.org/wiki/Bifrost_(trojan_horse)

    Include rootkit to hide server processes; Include extensions to add features (adds 22,759 bytes to server) Use persistence (makes the server harder to remove from the infected system) The client component has the following capabilities: Process Manager (Browse or kill running processes) File manager (Browse, upload, download, or delete files)

  8. rkhunter - Wikipedia

    en.wikipedia.org/wiki/Rkhunter

    rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. [1] It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. rkhunter is notable ...

  9. OSSEC - Wikipedia

    en.wikipedia.org/wiki/OSSEC

    Rootkit and Malware Detection: Process and file level analysis to detect malicious applications and rootkits. Active Response: Respond to attacks and changes on the system in real time through multiple mechanisms including firewall policies, integration with 3rd parties such as CDN's and support portals, as well as self-healing actions.