Rootkits - Lakelands Computing

Title
Go to content
Rootkits
Basic Rootkits on their own are not dangerous , they simply hide software and the traces software leaves behind in the operating system. The fact that they hide software and its traces can be used maliciously.

Rootkits can be used to hide:
  • programs that allow hackers to steal your passwords
  • code that make it easy for them to steal your credit card or online banking information.
  • tools that let hackers change or disable your security software
  • programs called key loggers which track which keys you press on the keyboard, making it easy for criminals to steal your personal information.
  • viruses
  • worms
  • backdoors

Some toolkits are specifically designed to hide these pieces of malicious software from Anti-virus, anti -Spyware and anti-Malware software.

How do rootkits get on your computer?
  • You might open an email and download a file that looks safe but is actually a rootkit
  • Or accidentally download a rootkit through an infected mobile app.
Rootkits explained
All Text copyright Lakelands Academy & Mr T Purslow 2020.
All images copyright free / creative commons unless otherwise stated.
You are welcome to use under a Creative Commons Attribution-nonCommercial-ShareAlike License.
All Text copyright Lakelands Academy & Mr T Purslow 2020.  All images copyright free / creative commons unless otherwise stated. You are welcome to use under a Creative Commons Attribution-nonCommercial-ShareAlike License.
All Text copyright Lakelands Academy & Mr T Purslow 2020.  All images copyright free / creative commons unless otherwise stated. You are welcome to use under a Creative Commons Attribution-nonCommercial-ShareAlike License.
Back to content