from The American Heritage® Dictionary of the English Language, 5th Edition.
- noun A set of software tools used to gain unauthorized access to a computer system on a network and to control its operation.
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun computing A set of
software toolsused by a third partyafter gaining access to a computer systemin order to concealthe altering of files, or processesbeing executedby the third party without the user's knowledge.
- verb transitive To infect (a computer system) with a rootkit.
from The American Heritage® Dictionary of the English Language, 4th Edition
from Wiktionary, Creative Commons Attribution/Share-Alike License
The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or
The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
All a rootkit is capable of doing is hiding something from the windows api.
A rootkit is a tool designed to go undetected by the security software used to lock down control of a computer after an initial attack (read: anti-virus and firewalls are useless).
If the Sony DRM rootkit is active (hiding) in the system during infection, the bot will not run at all.
A rootkit is a set of tools developed to crack a computer system.
With the amount of press coverage the dirty rootkit is getting, whatever happens it will be hard for Sony to come out of the whole mess without a bigger PR disaster on their hands than they already have.
Within a week, a "rootkit" -- a form of malicious software -- had been installed on its hard drive.
They are called "rootkit" A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
The software appeared to be a. sys component hiding behind a rootkit, which is software that is designed to hide the fact that a computer has been compromised, according to Trend Micro.