网站首页  词典首页

请输入您要查询的词汇:

 

词汇 rootkit
释义 BETA

Examples of rootkit


rootkit isn’t in the Cambridge Dictionary yet. You can help!
This mitigates a common tactic used by rootkits to hide themselves from user-mode applications.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Yet other programs of a rootkit may be used to survey the network or to overhear more passwords that are travelling over it.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses).
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It's common that a rootkit creates a hidden, encrypted filesystem in which it can hide other malware or original copies of files it has infected.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Rootkits can, in theory, subvert "any" operating system activities.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The rootkit hides in firmware, because firmware is not usually inspected for code integrity.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Rootkits may also give the means to change the very operating system of the computer it is installed on.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Traces of the malware are hidden by rootkits, which prevent the person from being aware that data is being stolen.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It detected 100% of rootkits, 93% of keyloggers and 89% of scareware.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A rootkit allows an attacker to subvert a compromised system.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The term rootkit has negative connotations through its association with malware.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
As with computer viruses, the detection and elimination of rootkits is an ongoing struggle between both sides of this conflict.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Some of these functions require the deepest level of rootkit, a second non-removable spy computer built around the main computer.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
However, this is not the case with a kernel type rootkit.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
All services to the public are free, including malware and rootkit cleanup of infected computers and removal instructions on rogue anti-spyware programs.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
It employs a user-mode rootkit technique to hide and steal its victims information.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.


随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/23 8:20:55