STEALTH: A Method of Hiding and Encrypting Files in NTFS

碩士 === 國立中央大學 === 資訊工程學系 === 101 === A rootkit can hide any information such as the files, processes, drivers, and network connections on your computer. With development of operating system, Rootkits have many hidden methods such as the traditional hooking or DKOM (Direct Kernel Object Manipulation)...

Full description

Bibliographic Details
Main Authors: Syun-cheng Ou, 歐巡丞
Other Authors: Fu-hau Hsu
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/957w2a