.

Healthy Passwords

.

.

What is a Root Kit

Root kits are considered any program installing itself onto your computer as something called "Root-level" priviledge. Root access means it can do anything it wants to on your computer. Some common things may be:

  1. Turn on your webcam.

  2. Add, change or delete documents.

  3. Take screenshots.

  4. Capture keystrokes.

  5. Capture form elements, such as username and password.

  6. Send email.

When a computer runs, programs load in layers. A good visual representation is a bulls-eye. The very center of the bulls-eye is the kernel, or lowest level. Anything running in the kernal can access or change any part of your computer.

Root kits are considered very bad because a low level kernal rootkit can hide itself from security software, such as anit-virus and malware. Some of these are so sneaky, the only way to remove them is by completely wiping the entire disk and installing a new operating system from scratch.

If you have a kernal level root kit, and just pop in a Windows CD to reinstall, it may still exist after you are done, because you did not wipe out the disk at the lowest level first.

The best way to protect yourself from rootkits is through knowledge. A key part of that knowledge is learning how to safely browse the internet. You should never be logged in as an administrator level user while browsing. Y0u should check the reputation of the website before going to it.

McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams

.

Leaf

Leaf

Home | Live CD Listing | Password Worksheet | Third Party Ratings | Purchase | Errata | Contact | News | News Archive | Legal

Copyright © 2011, Sustainable Alternatives, LLC | Ligonier, PA 15658 | 724-238-9560 | All Rights Reserved.

 Sustainable Alternatives, LLC BBB Business Review
Leaf

.

Leaf