RootKits- What Are They and What to Do About Them?

Rootkits help intruders maintain access to a system without the user's knowledge.  These tools are used by malicious intruders to control, attack, or ferret information from systems on which the software has been installed.  Once installed by a virus or after a successful hack, rootkits run quietly in the background.  Rootkits can make themselves invisible to security systems, including antivirus tools and system-diagnostic tools such as Windows Task Manager. 

This page provides useful links to external websites that help you increase your understanding of Rootkits and what you can do about them. 

Understanding Rootkits

Windows Rootkit Detection Tools

Unix/ Linux Rootkit Detection Tools

Questions/Need More Info?  Contact security@miami.edu.