El mié, 10-11-2010 a las 20:51 +0100, Marcus Meissner escribió:
This can be enhanced, but there are limits of course. Rootkits probably want to hook the filesystem and there we will probably fail ;)
Rootkits typically want to hook filesystem, network and processes. They want all for them ;)