answersLogoWhite

0


Best Answer

Rootkit is a type of malware that hides its presence while it's active on a computer. Rookit hides other malware too. It can be extremely difficult to remove a rootkit from a computer. However, solid antivirus software usually removes rootkits without any problems.

Source: http://deletemalware.blogspot.com

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the dangers of a rootkit?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Name two anti-rootkit products?

Rootkit revealer and backlight.


What is a malicious program allows someone to take control of a computer?

Rootkit


Name two anti rootkit products?

rootkit revealer by sysinternals. Backlight by F-secure.


What is an anti-root software?

I believe you are referring to anti-rootkit software. Firstly, a rootkit is something that allows other threats (eg. viruses, spyware) to hide themselves. (Rootkits are often bundled with keyloggers or trojans.) Therefore, conventional anti-virus products cannot remove them because they are hidden. Anti-rootkit software is designed to remove the rootkit.


What programme would you use to gain administrative rights to someones computer?

bot executive android rootkit worm


What two methods does anti-rootkit software use to detect a rootkit?

The software looks for running processes that don't match up with the underlying program filename, and the software compares files, registry entries, and processes provided by the OS to the list it generates from the raw data. If the list differ, a rootkit is suspected.


What are the names of some anti-rootkit products?

RootkitRevealer, BackLight


How does rootkit running in user mode normally hide?

A+ pg. 1052: A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.


Which type of malware should you ensure that the tool is capable of removing?

Rootkit


What virus software is in use within organization?

'''In fact, RootQuest 1.0.1 can help you. I'd like to give you a full introduction. Rootkits can be able hidden on computers and remain undetected by anti-virus software, RootQuest finds and removes any rootkit that is hidden on your computer using advanced rootkit detection systems. ''' RootQuest is a good solution to detection and remove all rootkit that currenlty running as background services on computer system. Designed for Windows 2000/XP/2003/Vista, the program will monitor system proccesses and remove all rootkit components quickly and securely. Not only is it a great tool for finding rootkits, it also can prevent the installation and infection of many rootkits. Features: * Real-time protection from hackers and crackers. * Auto detect rootkit processes. * Protected resources in the hard drive. * Finds and removes rootkit . * Prevents rootkit being installed. * Scan detection based signature . * Self-protection all rootkit attack Therefore, it is a virus software that can be used within organisation. Hope this help you! http://www.globalfreeware.com/RootQuest-101.html


How does a rootkit running in user mode normally hide?

A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window. It can prevent Task Manager from displaying the running rootkit process, or might cause Task Manager to display a different name for this process. The program filename might not be displayed in Windows Explorer, the rootkit's registry keys might be hidden from the Registry Editor, or the Registry Editor might display incorrect information.


What statement best identifies the intentions of a rootkit?

It takes control of a system without authorizationAnswer Explanation: A rootkit is a program that has been designed to take control of a system without the authorization of the owner. The rootkit will take entire control of the operating system that is running on the system without the owner knowing. The malicious user can then perform administrative activities behind the scenes.