Lecture 14 Part I: Programming Tools. Rootkit Tools used to cover up tracks of a hacker Word has origins in UNIX, but applies to other systems At the.
Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine [email protected] Solutions Engineer CoreTrace.