Rootkits

Rootkit

Admin account

Rings of permission

Techniques used by rootkits

Detect rootkits