By Jason Baker


There's nothing new under the sun, and rootkits are no exception. In the early days of personal computers, in the age of the DOS command-line operating system, there were viruses that hid their presence from the users and anti-virus programs. They did it by intercepting some system calls that were responsible for reading the files, and lied to the system by filling these calls with fake information. You could view an infected file right in front of your eyes and see nothing but legit code! These viruses were called 'stealth' in those days.

Generally, all computers come with a few basic devices. These usually include a Monitor, keyboard, mouse, printer, and the computer (also known as the tower or case).

Today, using an antivirus does not guarantee complete safety. A rootkit could install into your system and fool the antivirus system by hiding itself. The problem is that modern antivirus programs try to detect rootkits at the time when they are already active. Antivirus programs use the very functions that are intercepted by the rootkits specifically for the purpose of deceiving antivirus. It's a gun vs. armor race and your PC is the firing range.

Keyboard - The keyboard is one of the most basic input devices. This is the device that has all the numbers, letters, and symbols that you use to type words on the computer.

A support vector machine has two main functions. The first one is that it can be a classification function (wherein the output is binary: while the input is in a category). Meanwhile, the second function is that it can simply be a general regression function.

Computer - This is the device that houses the "Guts" of your computer. Inside is where all of the magic happens. Generally, inside a computer case you will find a hard drive, system board, RAM, network card, and all the other devices that let you do all of the fun things that computers nowadays let you do.




About the Author:



0 comments