版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.csdn.net/topmvp - topmvp
Recognize rootkits and plan your counter-attack
Here's how to root out this malicious software and manage damage control
*Identify types of rootkits
*Keep your computer clean
*Root out invasive software
*Protect your system with regular updates
*Plan for recovery
*Recognize when you have to start over
http://depositfiles.com/files/671942
http://rapidshare.com/files/19558038/b-488b01.zip
Recognize rootkits and plan your counter-attack
Here's how to root out this malicious software and manage damage control
Rootkits are diabolical, virtually invisible ways for someone to hijack your data, computer, or worse your entire network. But never fear this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.
Discover how to :*Identify types of rootkits
*Keep your computer clean
*Root out invasive software
*Protect your system with regular updates
*Plan for recovery
*Recognize when you have to start over
http://depositfiles.com/files/671942
http://rapidshare.com/files/19558038/b-488b01.zip