Abstract: Hiding technology is widely used in computer system security, especially in network attacks. When an attacker successfully breaks into a system, it is particularly important to effectively hide the attacker\'s files, processes and loaded modules. This article will discuss advanced hiding techniques for files, processes and modules in Linux systems. Some of these techniques have been widely used in various backdoors or security detection programs, while some are just starting out and are still in the discussion stage with few applications.
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore