Rkhunter

Results: 3



#Item
1Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , ,   Abstract-- Techn

Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2004-08-12 13:59:29
2The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

Add to Reading List

Source URL: www.belowgotham.com

Language: English - Date: 2009-04-09 11:20:03
3Rootkits Stéphanie Deléamont and Benoît Perroud EPFL/LASEC: Security Protocols and Applications

Rootkits Stéphanie Deléamont and Benoît Perroud EPFL/LASEC: Security Protocols and Applications

Add to Reading List

Source URL: www.noisette.ch

Language: English - Date: 2006-04-29 07:02:38