The first book completely devoted to this important part of security in a Windows environment.Listing 7-2 Rkd.pl Perl script for performing local and remote rootkit detection ( cont.) # # sub ... The script uses several techniques to attempt to locate rootkits by their footprints, particularly those that use DLL injection techniques. It should beanbsp;...
|Title||:||Windows Forensics and Incident Recovery|
|Publisher||:||Addison-Wesley Professional - 2005|