Skip to Main Content
Rootkits: Subverting the Windows Kernel
book

Rootkits: Subverting the Windows Kernel

by Greg Hoglund, James Butler
July 2005
Intermediate to advanced content levelIntermediate to advanced
352 pages
7h 18m
English
Addison-Wesley Professional
Content preview from Rootkits: Subverting the Windows Kernel

Chapter 3. The Hardware Connection

 

One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them.

 
 --THE FELLOWSHIP OF THE RING,J. R. R. TOLKIEN

Software and hardware go together. Without software, hardware would be lifeless silicon. Without hardware, software cannot exist. Software ultimately controls a computer, but under the hood, it’s the hardware that implements the software code.

Furthermore, hardware is the ultimate enforcer of software security. Without hardware support, software would be totally insecure. Many texts cover software development without ever addressing the underlying hardware. This might work for the developers of enterprise applications, but it won’t work for rootkit developers. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Rootkits and Bootkits

Rootkits and Bootkits

Alex Matrosov, Eugene Rodionov, Sergey Bratus
The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

Joxean Koret, Elias Bachaalany

Publisher Resources

ISBN: 0321294319Purchase book