While Windows is the operating system that is most often targeted by attackers, malware can find its way into other operating systems, including Linux.
In this month's screencast demonstration, Peter Giannoulis of The Academy Home and The Academy Pro demonstrates how to install and use Rootkit Hunter, a free rootkit scanner for Linux and BSD distributions that can detect dozens of malicious code variants that may otherwise go undetected.
Want more screencasts? Visit our
Requires Free Membership to View
About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security
consultant in Toronto, Ontario. He currently maintains The
Academy Home and The Academy Pro, which provide
streaming video for enterprises and consumers on how to configure and troubleshoot many of today's
top security products. He also serves as a technical director for GIAC.
This was first published in May 2009
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation