Author:Decloedt, HE; Van Heerden, Renier PDate:Oct 2010This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, ...Read more
Author:Grobler, MDate:Oct 2010Strategic information security is becoming a more prominent aspect of modern day living. With the strong digital component that forms part of modern day business, the multiplicity of security risks and the emergence of increasingly complex ...Read more