> Rootkits typically install loadable modules to intercept process
> listings and filesystem calls and enable them (the rootkits) to hide
> their processes and files.  All toward the objective of making the
> rootkit more difficult to detect.

Got it. These will not help in gaining initial access, but in remaining
undetected later, if the virus/worm has long-term plans. :)

> However, the original poster's comment, that using static drivers,
> etc. is more secure, is only true if you disable loadable modules
> entirely in your kernel.  Otherwise the rootkit will be able to
> install its LKM in any case, regardless of how your kernel components
> are linked.

Correct.

And the real original poster had asked about performance. I guess on the
performance front, there isn't much of an issue by going the module way?

Shuvam


_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to