The Root of the Problem

Rolich, Paul
November 2005
TechDecisions;Nov2005, Vol. 7 Issue 11, p13
Discusses the susceptibility of root kits to hackers of business information systems. History of root kits; Detection of root kits; Operation of the kernel level by players in the rootkit world.


Related Articles

  • Fear, Uncertainty, Doubt. Alter, Allan // CIO Insight;May2007, Issue 81, p71 

    The article reports that chief information officers (CIOs) in small and mid-size information technology companies are not confident on their IT defense in the U.S. The CIOs admitted that their companies are not offering adequate defense against viruses, trojans, worms and hackers. It is...

  • Backchat.  // Information World Review;Jan2005, Issue 209, p26 

    Focuses on the International Information Industry Awards held at the Royal Lancaster Hotel in London, England on November 30, 2004. Information on the Best Business Information award given to Hoovers Online; Highlights of the event.

  • Discussion of Information Transfer among Internet Firms: The Case of Hacker Attacks. David, Julie Smith // Journal of Information Systems;Fall2003, Vol. 17 Issue 2, p83 

    Discusses the case of computer hacker attacks that triangulate the understanding of security breaches of information transfer among Internet firms. Archival data analysis requires careful models specification. Additional methodological recommendations include expanding the DoS events in the...

  • Data Of Reckoning. Hardy, Quentin // Forbes Global;5/10/2004, Vol. 7 Issue 8, p68 

    Discusses several ways of utilizing business data from information technology. Factors which contribute to the problems in managing business database; Features of the DB2 Information Integrator software developed by Nelson Mattos, computer scientist in the Data Management Software Group of...

  • COBIT 5: Enabling Information Progress Report. De Haes, Steven // COBIT Focus;Oct2012, Vol. 2012 Issue 4, p1 

    The article offers information on the COBIT�: Enabling Information project. It states that the project aims to develop an innovative reference guide for the information enabler for governance and management of enterprise information technology (GEIT). It mentions that the project is...

  • Why Distributors Can Still Matter. Nowakowski, Jim // Electrical Wholesaling;Mar2007, Vol. 88 Issue 3, p63 

    The article discusses the importance of information technology in sharing business information. According to the author, distributors provide informations about their products and jobs in accordance to the format their customers want. The key to sharing of information is to understand the market...

  • Records management is resting on shaky ground. Tebbutt, David // Information World Review;Oct2005, Issue 217, p15 

    This article discusses a 2005 survey conducted by the Association for Information and Image Management regarding the knowledge of records management by records management professionals. Research analyst Richard Edwards claimed that more than 70% of records management professionals believe that...

  • Get a Handle on IT Spending: RDA Assessment. Griffin, Jane // DM Review;May2006, Vol. 16 Issue 5, p8 

    The article focuses on the need for companies to conduct a reporting environment and data architecture (RDA) assessment to measure information technology spending. Key processes examined in an RDA assessment include data acquisition, report generation, report delivery and information...

  • Letters to the editor. Parker, Laura; Brook, Paul // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p20 

    Presents letters to the editor referencing articles and topics discussed in previous issues. Need for companies to move patch management to a proactive state; Views on the intrusion prevention sector; Increase in company information being stored locally on individuals' personal computers and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics