Decloedt, HEVan Heerden, Renier P2010-12-202010-12-202010-10Decloedt, HE and van Heerden, R. 2010. Rootkits, Trojans, backdoors and new developments. Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010, pp 4-11978-0-620-47586-0http://hdl.handle.net/10204/4689Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluatedenCyber threatCyber trendInformation securityICT UsesProceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010Rootkits, Trojans, backdoors and new developmentsConference PresentationDecloedt, H., & Van Heerden, R. P. (2010). Rootkits, Trojans, backdoors and new developments. CSIR. Defence Peace Safety and Security. http://hdl.handle.net/10204/4689Decloedt, HE, and Renier P Van Heerden. "Rootkits, Trojans, backdoors and new developments." (2010): http://hdl.handle.net/10204/4689Decloedt H, Van Heerden RP, Rootkits, Trojans, backdoors and new developments; CSIR. Defence Peace Safety and Security; 2010. http://hdl.handle.net/10204/4689 .TY - Conference Presentation AU - Decloedt, HE AU - Van Heerden, Renier P AB - This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated DA - 2010-10 DB - ResearchSpace DP - CSIR KW - Cyber threat KW - Cyber trend KW - Information security KW - ICT Uses KW - Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 LK - https://researchspace.csir.co.za PY - 2010 SM - 978-0-620-47586-0 T1 - Rootkits, Trojans, backdoors and new developments TI - Rootkits, Trojans, backdoors and new developments UR - http://hdl.handle.net/10204/4689 ER -