Nutter offers background on the danger of NT Rootkits.Lately I’ve heard a couple of stories about NT Rootkits. What can you tell me about them, and is this something I should be concerned about?– Via the InternetYou should be concerned about NT Rootkits. Until recently, they’ve mostly been a concern of the Linux/Unix world. NT Rootkits can do several things, such as hide files on the server/workstation that would alert you to their presence. The real “power” of the NT Rootkit is that it can hide processes or directories. I have seen a system infected by a rootkit and it caused problems with the SMTP service on the server being able to send or receive mail. The problem with NT Rootkits is that even if you know what to look for, you could still miss the tell-tale signs. You can go to rootkit.com for a sampling of some of the rootkits currently available. You will need some type of C compiler in order to compile the source files for them to be usable. Borland’s C++ Builder Personal edition is one that’s affordable and user friendly if you haven’t had any C experience before. I can’t emphasize this enough: When working with this kind of material ensure the machines you’re working on are isolated from your production network in every way possible.Depending on your training budget, there is training available from blackhat.com on how to defend from rootkits. Training is just one avenue to protect yourself from rootkit intrusion. Keeping the servers up to date on patches and limiting access to the server console, both locally and remotely, are just two of the additional steps to take to help avoid being a victim of the rootkit. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe