ResearchSpace

Rootkits, Trojans, backdoors and new developments

Show simple item record

dc.contributor.author Decloedt, HE
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2010-12-20T13:42:39Z
dc.date.available 2010-12-20T13:42:39Z
dc.date.issued 2010-10
dc.identifier.citation Decloedt, HE and van Heerden, R. 2010. Rootkits, Trojans, backdoors and new developments. Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010, pp 4-11 en
dc.identifier.isbn 978-0-620-47586-0
dc.identifier.uri http://hdl.handle.net/10204/4689
dc.description Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010 en
dc.description.abstract This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated en
dc.language.iso en en
dc.publisher CSIR. Defence Peace Safety and Security en
dc.relation.ispartofseries Conference Paper en
dc.subject Cyber threat en
dc.subject Cyber trend en
dc.subject Information security en
dc.subject ICT Uses en
dc.subject Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 en
dc.title Rootkits, Trojans, backdoors and new developments en
dc.type Conference Presentation en
dc.identifier.apacitation Decloedt, H., & Van Heerden, R. P. (2010). Rootkits, Trojans, backdoors and new developments. CSIR. Defence Peace Safety and Security. http://hdl.handle.net/10204/4689 en_ZA
dc.identifier.chicagocitation Decloedt, HE, and Renier P Van Heerden. "Rootkits, Trojans, backdoors and new developments." (2010): http://hdl.handle.net/10204/4689 en_ZA
dc.identifier.vancouvercitation Decloedt H, Van Heerden RP, Rootkits, Trojans, backdoors and new developments; CSIR. Defence Peace Safety and Security; 2010. http://hdl.handle.net/10204/4689 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Decloedt, HE AU - Van Heerden, Renier P AB - This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated DA - 2010-10 DB - ResearchSpace DP - CSIR KW - Cyber threat KW - Cyber trend KW - Information security KW - ICT Uses KW - Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 LK - https://researchspace.csir.co.za PY - 2010 SM - 978-0-620-47586-0 T1 - Rootkits, Trojans, backdoors and new developments TI - Rootkits, Trojans, backdoors and new developments UR - http://hdl.handle.net/10204/4689 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record