Article
Figure 1
Figure 2
Figure 3
Listing 1
Listing 2
Listing 3
Sidebar 1
Sidebar 2
sep2003.tar
Figure 2
How a kernel rootkit subverts the normal system calls
© 2005 CMP Media LLC. All Rights Reserved.
www.sysadminmag.com