Year 2 Sem B Time Table

JAN 11, 2010 - APR 24, 2010 Total Credit Hours: 17.00 Time Monday Tuesday Wednesday Thursday Friday 08:30-09:20 09:30-10:20 10:30-11:20 12458 CS2332-T02 MMW 2450 12495 CS3103-C01 ACAD LT-5 12456 CS2332-C01…

Continue Reading Year 2 Sem B Time Table

Rootkit Hunter, security monitoring and analyzing tool

  • Post Author:
  • Post Category:Linux
  • Post Comments:0 Comments

Rootkit Hunter (commonly abbreviated as “RKH”) is a security monitoring and analyzing tool for POSIX compliant systems, to help you detect known rootkits, malware and signal general bad security practices. Rootkits have a certain structure and files in certain areas, known to the Rootkit Hunter team. This is similar to virus signatures. RKH offers additional scans that may assist you.

(more…)

Continue Reading Rootkit Hunter, security monitoring and analyzing tool