Back to Results
First PageMeta Content
Rootkits / Malware / Chkrootkit / Hacker / Computer virus / Loadable kernel module / Kernel / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / System software / Computer security / Cyberwarfare


Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn
Add to Reading List

Document Date: 2004-08-12 13:59:29


Open Document

File Size: 224,77 KB

Share Result on Facebook

City

Ocho Rios / Indianapolis / /

Company

Red Hat / /

Country

Jamaica / /

Currency

USD / /

/

Facility

Georgia Institute of Technology / /

IndustryTerm

system utilities / rootkits on these compromised systems / ftp server / type operating systems / actual live systems / networked computer systems / default ftp server / /

OperatingSystem

UNIX / Red Hat Linux / Linux / /

Organization

Greensboro NC / Georgia Institute of Technology / Atlanta / /

Person

Henry Owen / John Levine / Julian Grizzard / /

Position

AIDE / system administrator / Accurate AIDE / /

Product

Honeynet / /

ProvinceOrState

Georgia / /

PublishedMedium

The Computer Journal / /

Technology

UNIX / Linux / operating system / operating systems / /

URL

http /

SocialTag