Hey,
Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner?
I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software...
Hey,
Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner?
I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software...
Hello,
I have a user whom is jacking in an unauthorized laptop/device into my network. We have a good idea of who it is, but need to provide evidence of the occurrences. This user is particularly troublesome as he has used his technical knowledge to undermine/discredit my IT department with...
Hello,
I have a user whom is jacking in an unauthorized laptop/device into my network. We have a good idea of who it is, but need to provide evidence of the occurrences. This user is particularly troublesome as he has used his technical knowledge to undermine/discredit my IT department with...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.