rar

Special hiding method under Linux

  • 2013-08-29
  • 153.31KB
  • Points it Requires : 2

Abstract: Hiding technology is widely used in computer system security, especially in network attacks. When an attacker successfully breaks into a system, it is particularly important to effectively hide the attacker\'s files, processes and loaded modules. This article will discuss advanced hiding techniques for files, processes and modules in Linux systems. Some of these techniques have been widely used in various backdoors or security detection programs, while some are just starting out and are still in the discussion stage with few applications.

unfold

You Might Like

Uploader
banana
 

Recommended ContentMore

Popular Components

Just Take a LookMore

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
×