Stopping Rootkits at the Network Edge

Keeping remote users’ laptops healthy is not an easy task these days. Infections are everywhere, and once these PCs leave the shelter of an enterprise network, they can easily get filled with rootkits, trojan horses, spyware, and viruses. Of the many types of infection, rootkits are the most troubling.

In this white paper for the Trusted Computing Group, I explain what rootkits are, how they do their dirty work, and ways that the TCG is working on stopping them using a variety of developer’s tools.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.