Search results
Jump to navigation
Jump to search
- {{Short description|Software}}{{Notability|date=February 2025}} {{Infobox Software ...2 KB (310 words) - 06:32, 13 March 2025
- {{Infobox software | genre = [[rootkit]] detector ...4 KB (473 words) - 08:42, 7 May 2025
- {{Infobox software | genre = [[Security software]] ...4 KB (457 words) - 04:33, 28 February 2025
- ...erating different versions of it, in order to evade detection by antivirus software. It is similar to, but less sophisticated than, [[polymorphic code]].<ref n ...tor.<ref name="blunden">{{cite book |last1=Blunden |first1=Bill |title=The Rootkit Arsenal: Escape and Evasion |date=4 May 2009 |publisher=Jones & Bartlett Le ...3 KB (363 words) - 09:08, 8 September 2024
- {{Short description|Internet security software company}} {{Infobox software ...6 KB (869 words) - 08:14, 15 June 2025
- | name = Winternals Software LP | genre = [[Software development]] ...11 KB (1,328 words) - 22:46, 4 June 2025
- | industry = [[Computer software]] | products = [[Cybersecurity software]] ...9 KB (1,185 words) - 09:59, 5 February 2025
- {{Short description|Spyware removal software}} ...uish|text=[[SpySheriff]] or its many clones, a knockoff of this legitimate software}} ...14 KB (1,832 words) - 17:07, 1 December 2024
- ...e the software's existence, leading to both programs being classified as [[rootkit]]s. ...t merely made the program's files visible while also installing additional software that could not be easily removed, collected an [[email address]] from the u ...43 KB (5,896 words) - 13:15, 30 June 2025
- {{Short description|Software company of Canada}} ...a|Claranova]])<ref>{{cite web |title=50.1% Stakes in Upclick Inc. and Lulu Software, Inc. and Adaware: Private Company Information |url=https://www.bloomberg.c ...13 KB (1,644 words) - 13:03, 24 June 2025
- ...retroactively applied to an unprotected medium using typical hardware and software. ...urposely fake some information within the filesystem. Early generations of software copied every single file one by one from the original medium and re-created ...13 KB (2,029 words) - 15:01, 2 May 2025
- {{Short description|Software designed to enable access to unauthorized locations in a computer}} ...AAQBAJ&pg=PA100 |isbn=9783319321257|via=[[Google Books]]}}</ref> The term "rootkit" has negative connotations through its association with [[malware]].<ref na ...69 KB (9,487 words) - 01:49, 26 May 2025
- {{Short description|Open-source antivirus software}} {{Infobox software ...23 KB (3,130 words) - 16:27, 30 June 2025
- ...United States government in ''[[United States v. Microsoft]]'', where the software company was charged with committing a variety of antitrust crimes. During t ==Sony rootkit investigation== ...24 KB (3,347 words) - 12:24, 31 March 2025
- {{About|the software company|the Egyptian goddess|Isis|the IVF technology|e-SET}} | industry = Security software ...28 KB (3,739 words) - 08:06, 30 June 2025
- ...ali|last4=Kantola|first4=Raimo|title=2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)|chapter=LiaaS: Lawful I ...-taps-details-at-last-733244.html | access-date = 2007-11-24}}</ref> This software was eventually found to be installed on four of Vodafone's [[AXE telephone ...23 KB (3,200 words) - 18:50, 23 June 2025
- {{Short description|Computer software to defend against malicious computer viruses}} ...x|[[ClamTk]], an open-source antivirus based on the [[ClamAV]] antivirus [[software engine|engine]], was originally developed by Tomasz Kojm in 2001.]] ...97 KB (12,714 words) - 21:01, 23 May 2025
- {{Infobox software ...] systems. It provides information about computer performance and running software, including names of running [[process (computing)|processes]], [[CPU]] and ...20 KB (3,002 words) - 00:56, 25 April 2025
- Like Unix systems, Linux implements a [[Multi-user software|multi-user]] environment where users are granted specific [[privilege (comp Some Linux users do run Linux-based anti-virus software to scan insecure documents and email which comes from or is going to Window ...58 KB (7,551 words) - 15:41, 27 May 2025
- ...separate program (e.g. [[Back Orifice]] may subvert the system through a [[rootkit]]), [[hardware backdoor|code in the firmware]] of the hardware,{{r|Zetter-2 Although the number of backdoors in systems using [[proprietary software]] (software whose [[source code]] is not publicly available) is not widely credited, th ...40 KB (5,475 words) - 19:13, 10 March 2025