Wednesday, 18 September 2013


Rootkits are malicious software which have the ability to hide the existence of other programs and files in a computer. Moreover, they enable an external individual to have administrator-level access on a machine by creating backdoors. Originally, a technology in a computer’s memory to allow an external user remote administration on to a system, Rootkit is not always meant for illegitimate purposes. However, due to constant association with malwares over the past few years, rootkits are now considered as malicious programs that are stealthy in nature.

Conventionally, rootkits have been of great help and use to Linux and Unix users. They used to be employed for the purpose of data and device security, as well as for digital rights management (DRM). However, due to their nature of being able to hide other applications they are fast becoming vital tools of hackers and crackers, to break into the security of a computer system. Now, if, by any means, you happen to identify that your PC is carrying a rootkit, you can be sure that it is bound to be accompanying a malware. No rootkit will be lying there in your Windows operated PC for any reasonably good cause.

A popular scandal, of association of Sony BMG with rootkits, depicts how rootkits used for even legitimate motives can turn out to be fatal. Back in 2005, Sony is believed to have released its audio CDs in the market with a DRM (digital rights management) component carrying rootkits. Though, intended to protect digital rights, these rootkits inadvertently created vulnerabilities, in the systems where these CDs were inserted, which could be exploited by any malware entering that PC.

Rootkits use advanced methods of utilizing system vulnerabilities or a computer program, like Trojan Horse, to enter into a PC and gain privileged access. Once successfully installed, rootkits are able to conceal other infections and malwares. Then, even smart applications and security experts cannot single out a rootkit from the computer. Rootkits alter operating system settings and other files to evade detection and allow privileged access. They can also spread to other devices on a network.

Detection and removal of rootkits is a difficult task, as they do not display any symptoms of their existence. It is, therefore, important to use a powerful firewall protection and reliable Antivirus Software to avoid getting rootkits in your PC. You can download and install Protegent Antivirus and Protegent Internet Security programs for dual protection from rootkits.

0 comments:

Post a Comment