Uninformed Journal
October 22nd, 2007, 12:22
As rootkits continue to evolve and become more advanced, methods that can be used to detect hidden objects must also evolve. For example, relying on system provided APIs to ...
http://uninformed.org/?v=4&a=2&t=sumry
http://uninformed.org/?v=4&a=2&t=sumry