• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Reviews / Book Review: Rootkits – Subverting the Windows Kernel

Book Review: Rootkits – Subverting the Windows Kernel

2008-12-04 by Jason

Rootkits, authored by Greg Hoglund and James Butler, is a very technical reading for a very technical topic. Rootkits themselves (the technology) gained quite a bit of fame in 2005 when Sony was found to be embedding rootkit technology along with their CDs to prevent copying of music. This book goes well beyond the simple copyright protection and really delves into the attacker’s perspective: getting in and staying in without being detected. There are plenty of reasons why the corporate world should be afraid of rootkit technology, corporate espionage, record tampering, insider trading, and much more.

Plenty of code line the pages of Rootkits providing examples and the means of creating an effective rootkit. It is a very helpful book in understanding the architecture of rootkits from the ground up and actually the architecture of Windows as you see different access points and vulnerabilities.

All in all, the book was very interesting from a consumer perspective and an IT perspective, and that is said without any particular interest in creating a rootkit, the trajectory of the book. I was more interested in learning about the technology, the problem, the vulnerabilities, ways to detect rootkits, and ways to prevent them. This book sufficiently answered those questions and was worth reading for my IT responsibilities alone.

If you are only interested in IT related materials, such as: weaknesses, where rootkits would be implemented, hiding data, and detecting rootkits, I recommend reading the following chapters from Rootkits.

Chapters:
1 Leave no trace
3 The hardware connection
8 Hardware manipulation
9 Covert channels
10 Rootkit detection

The rest of the chapters should be at least skimmed to gain an understanding and keep context of where the book is heading, but to remove some technicality and allow focus on IT-related issues, those chapters (half of the book) can be read thoroughly.

Filed Under: Reviews, Security and Privacy

Trending

  • Resolve Internet Explorer Slowly Opening New Tabs
    In Software, Tech Solutions
  • The Internet of Things
    In Infographics
  • Mozilla Introduces BrowserID To Manage Logins Across Browsers
    In Media, Security and Privacy

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • SOLVED: “This modification is not allowed because the selection is locked.” SOLVED: "This modification is not allowed because the selection is locked."
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO   How Digital Technology Brought the Rise of the CMO  
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • The Latest Innovations In Payment Technology
  • How Digital Technology Brought the Rise of the CMO  

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in