- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Rootkits For Dummies Paperback – Jan 30 2007
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
From the Back Cover
Recognize rootkits and plan your counter-attack
Here's how to root out this malicious software and manage damage control
Rootkits are diabolical, virtually invisible ways for someone to hijack your data, computer, or worse — your entire network. But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they've done, and set up defenses to keep new ones from taking root in your system.
Discover how to
- Identify types of rootkits
- Keep your computer clean
- Root out invasive software
- Protect your system with regular updates
- Plan for recovery
- Recognize when you have to start over
All on the bonus CD-Rom
- Anti-malware utilities and scanners
- Backup and imaging applications
- System analysis programs
- Rootkit-detection-and-removal applications
- Password protectors and generators
For details and complete system requirements, see the CD-ROM appendix
About the Author
Larry Stevenson is a veteran security consultant and instructor.
Nancy Altholz is a Microsoft Security MVP and security expert. Both are associated with CastleCops.com, a resource for security professionals.
Inside This Book(Learn More)
Top Customer Reviews
Most Helpful Customer Reviews on Amazon.com (beta)
You don't have to be a 'techie' to get this (although parts of the book are aimed at 'techies'). All you need is a very basic knowledge of PCs (i.e. How to boot up!). This book (and very helpful CD) will walk you, step-by-step through EVERYTHING you need to know to protect your PC.
It contains URL's to technical sites if you happen to get stuck and explanations of how to back out of certain operations if you don't feel comfortable doing something before asking a 'tech' online.
Space constraints in Amazon don't allow me to continue very much further, but if your budget only allows for one book of this type, I urge you to get this one. I guarantee you won't be sorry and you will have learned an amazing amount of things which can harm your PC's (and by extension, YOUR) privacy and security (and exactly how to defend against them) in this online world...
Practical applications are referenced, along with URL's where you can find out more information, get more help, or just plain learn because you want to.
A definite keeper.
Larry Stevenson and Nancy Altholz have written a great reference book and provided readers with load of valuable information for preventing Malware from infecting your system, more important how to identify an infection and finally how to remove those nasty little Trojans and other gremlins from your system. All this information will hopefully prevent you from having to erase your hard drive, reload WindowsXP and all of your software. Even if you have to do this dreaded last resort, they offer some great information of how to get it done. The book includes a CD-ROM with Security first aid tools that include Anti-malware utilities and scanners, Backup and imaging applications, System analysis programs, Rootkit-detection-and-removal applications; it also includes password protectors and generators.
As our computer systems have developed, and we are using high speed DSL Connections to get online, the Blackhat Hackers have also developed their capabilities. I got hit with a Trojan while doing some Google research on Social Security information, so these idiots are out there, just about everywhere. I use a Norton Firewall, Norton Internet Security, Spybot S&D, Lavasoft's Ad_Aware and can still get zapped by a Rootkit. I was doing E-Mails and on line back in 1984, long before Al Gore even thought he invented it, so I have had a few decades of experience. I still learned more than a couple of things about dealing with Rootkits from this great reference. Check out CastleCops forum and website for some further information.
Eventhough I consider myself a computer user at the intermediate-to-advanced level: meaning I believe know a lot about web related applications and internet technology but my knowledge is very limited in areas such as hardware. My own personal knowledge of malware is spotty at best. In the area of cyber crime, my niche knowledge is that of phishing scams (emails and websites set up to steal identities, credit card and/or banking information from unususpecting end-users)
Consider this, as recently as 1999, I had little or no protection on my home PC when I went online. That year was the first time I tried anti-virus software, F-PROT. I was still using dialup at the time, but by that time, there were plenty of viruses out there. Nowadays, if one hooks up a PC loaded with Windows XP unprotected, it takes less than an hour for it to get infected. This book fills in the gaps for me of my own spotty knowledge. There are anti-rootkit programs recommended in the book that I already use, but there are still many I have not used yet and look forward to.
This book, like most of the Dummies series, is set up in a reference format. I have used the accompanying CD,and enjoyed GMER particularly. Additionally, I know there are some other very good useful freeware products one can use to defend oneself online. I will come back and update this information after I have used some more of the recommended programs.
My favorite chapter is 2 which mentions the three Rs of Survivable Systems: resistance (being difficult for malware attack), recogination (detecting and identifying infection) and recovery (bouncing back after a malware attack). This chapter helps me visualize what I should to protect my PC. The other chapters tell you how to secure your network, hard drive, your applications, your OS and everything else that could possibly get one infected when going online. The book has an occasional funny cartoon about the very topic of rootkits. It also contains a very useful index helping one to find the page for the topic they are interested in. One of the best finds of the book for me currently is making an backup of my entire hard drive using ISO image files. This is a great find for me personally as I recently had a hard drive failure and I only backed up files I created and some programs, but not the essential files related to the brand of PC I have. I also lost the key to my Windows XP home OS.
One thing many infected end-users do not know about is that they can post their problems to helpful free anti-malware websites. There is a chapter in this book outlining the ones the authors recommend. There are some great folks deeply dedicated in helping people who have various computer problems for free. This type of effort is probably still not well known to many people who are online, even for some who have been surfing for years.
This is the book to have to understand what rootkits are and what you need to do to avoid and get rid of them. If you follow the advice that is given, you will not get a rootkit infection for sure. However, even if you did you would be able to resolve it by following the author's instructions in Chapter 9, the pivotal reference chapter, which describes how to use anti-rootkit programs. Read and absorb that and you will be golden. Even if you decide you can't clear rootkits on your own, this book will make you an informed user. No computer servicer will be able to pull the wool over your eyes - you will know what questions to ask and procedures to request to be sure any solution for rootkits or other resident or active malware is a totally complete one.
Everyone from the novice to the advanced computer user can benefit from the concepts presented, regardless of their experience level. This is a must have book in today's world of malicious software attacks.
Look for similar items by category
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Security & Encryption
- Books > Computers & Technology > Software > Introductory Guides
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > For Dummies Store > Computers & Internet > Digital Business & Culture > General
- Books > For Dummies Store > Computers & Internet > Digital Business & Culture > Privacy
- Books > For Dummies Store > Computers & Internet > General
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > General
- Books > For Dummies Store > Computers & Internet > Networking > Networks, Protocols & API's > Network Security
- Books > For Dummies Store > Computers & Internet > Software > General
- Books > Textbooks > Computer Science & Information Systems > Networking