Mac Security: Identifying Changes to the File System

Black-hat hackers often use a bundle of tools called a rootkit to secure access to your machine and cover their tracks. When working on your computer, they need to store files and be sure that you will not stumble across them and get suspicious. Peter Hickman explains how this works.

11 Comments

  1. 2005-11-08 8:32 am
  2. 2005-11-08 10:42 am
    • 2005-11-08 4:50 pm
      • 2005-11-08 5:56 pm
  3. 2005-11-08 1:41 pm
    • 2005-11-08 2:13 pm
      • 2005-11-08 3:20 pm
        • 2005-11-08 3:43 pm
        • 2005-11-08 8:27 pm
  4. 2005-11-08 5:02 pm
  5. 2005-11-09 11:10 am