Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. Chaoscorpz

    Rootkit as part of defensive toolbox

    Hey, Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner? I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software...
  2. Chaoscorpz

    Rootkit as part of defensive toolbox

    Hey, Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner? I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software...
  3. Chaoscorpz

    Find and document unauthorized device

    Hello, I have a user whom is jacking in an unauthorized laptop/device into my network. We have a good idea of who it is, but need to provide evidence of the occurrences. This user is particularly troublesome as he has used his technical knowledge to undermine/discredit my IT department with...
  4. Chaoscorpz

    Find and document unauthorized device

    Hello, I have a user whom is jacking in an unauthorized laptop/device into my network. We have a good idea of who it is, but need to provide evidence of the occurrences. This user is particularly troublesome as he has used his technical knowledge to undermine/discredit my IT department with...

Part and Inventory Search

Back
Top