While Windows is the operating system that is most often targeted by attackers, malware can find its way into other operating systems, including Linux.
In this month's screencast demonstration, Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions that can detect dozens of malicious code variants that may otherwise go undetected.
Want more screencasts? Visit our
About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Home and The Academy Pro, which provide streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.
This was first published in May 2009