Rootkit is a malware that is designed to protect / hide malware, spyware and bots and prevent them will be detected by normal methods of detection. Once it has installed deadly potential to transform your important references in the garbage to the host computer.
It is designed to achieve the following objectives:
- For an unauthorized computer owner to come in and steal his / her powers for criminal activity to the theft of money via online banking to steal important documents, access, etc.
- To hide malicious software such as viruses, keyloggers, owners damaging the computer.
- For the computer as a zombie computer use to perform immoral activities such as sending spam to attack other computers via the Startup group, etc.
Rootkit virus types:
1- Virus persistent rootkit: This rootkit virus triggers whenever the computer startup / restart. He hides in files and invalid registry files reproduce offer valid Windows registry. It can not be easily detected and whenever the computer downloaded / restart without using an external factor. It remains in the registry of your computer, even when the computer is restarted.
2- Memory Rootkit Virus base: This type of rootkit virus is in the memory of your computer. They occupy an unallocated RAM of your computer and keep your computer is shut down by the owner.
3- User Mode Rootkits: In this case, the rootkit virus digs deep into the operating system and stores the location of the system drive and can not be detected by the antivirus program. He escaped the virus detection by integrating with the anti-virus program. If the anti-virus program will start to scan the system, hamper Rootkit and they mimic the action of anti-virus program and therefore shows no malware in a row.
4- kernel mode rootkits: Rootkits Kernel are dangerous compared to other rootkits. This type of rootkit modifies kernel data structures by adding or replacing the existing code. This is one of the deadliest rootkits that can not be detected by antivirus programs as they operate on the same level of security operating systems.
5- Firmware Rootkits: Firmware rootkits affect the device by an appropriate access device code and cease functioning. You can listen rootkit Mebromi the video card of the computer is compromised. This rootkit is installed when you restart your computer.
6- Kit boot: bootkit is a rootkit is designed for MBR (Master Boot Record) will infect your computer. It primarily affects the boot and POST (Power On Self Test) of the computer.
7- Hypervisor Rootkits: This type of rootkit is designed to influence the configuration of the virtual machine. Hypervisor is a layer between the physical layer and the virtual layer, it is not even loaded when the computer reboots and becomes active if the operating system will be prompted to restart the virtual machine. Its mission is to use hardware virtualization and thus enjoy a true triggered by intercepting operating hardware operating system.
How to prevent rootkits:
1- One of the best ways to make your computer is to prevent rootkits, create a system restore point at regular intervals.
How to prevent rootkits:
1- One of the best ways to make your computer is to prevent rootkits, create a system restore point at regular intervals.
2- In most cases, rootkit between computer through spam mail, it is always advisable to avoid spam.
3- It is always recommended that any external device before because it may contain harmful malware scan.
4- You need to regularly update the program from the computer anti-virus software on the actual site of the manufacturer. Aside from the real site of the manufacturer do not use any antivirus security, these traps are created by poor people, promises to fulfill their evil intentions.
5- Use the tools essential security Microsoft security can be found on the Microsoft support site.