-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
A rootkit is a tool to gain root access. There are many of these.
Just google for rootkit, you can add NT, windows, linux or whatever, and
you'll see the abundancy of these.
The user of a rootkit does not have to be a black hat (criminal hacker) but
can also be people wanting to test their setup, or being hired to test
others.
The reason for tools like these are easily available is due tp the fact that
hackers already have them. You not having them (as an administrator) makes it
harder to defend against them.
- --
Steve
"They that would give up essential liberty for temporary safety deserve
neither liberty nor safety."
Benjamin Franklin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFA1TOwljK16xgETzkRAiAzAJ4uuheLSKeHHgvtX/UPrpHl7BfefQCbBoVE
/FO32N9TZBqqcMOTn4Rvugc=
=V2tv
-----END PGP SIGNATURE-----
-----------------------------------------------------------------------
This list is provided as an unmoderated internet service by Networked
Knowledge Systems (NKS). Views and opinions expressed in messages
posted are those of the author and do not necessarily reflect the
official policy or position of NKS or any of its employees.
This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 17:56:50 EDT