Rootkits , which unnoticeably reside in your
computer , stealthily carry on remote control and software
eavesdropping , are a great threat to network and computer
security. It’s time to acquaint ourselves with their implement
and detection. This article pays more attention to kernel root2
kits , because they are more difficult to compose and to be
identified than useland rootkits. The latest technologies used
to write and detect kernel rootkits , along with their advanta2
ges and disadvantages , are present in this article.