Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.
No comments:
Post a Comment