Guest User

Untitled

a guest
Oct 17th, 2017
60
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.47 KB | None | 0 0
  1. In the early days, back when an 8086 was cutting-edge technology, the skills
  2. required to undermine a system and evade detection were funneled along an
  3. informal network of Black Hats. All told, they did a pretty good job of sharing
  4. information. Membership was by invitation only and meetings were often
  5. held in secret. In a manner that resembles a guild, more experienced members
  6. would carefully recruit and mentor their proteges. Birds of a feather, I
  7. suppose; affinity works in the underground the same way as it does for the
  8. Skull and Bones crowd at Yale. For the rest of us, the information accumulated
  9. by the Black Hat groups was shrouded in obscurity.
  10.  
  11. This state of affairs is changing and this book is an attempt to hasten the
  12. trend. When it comes to powerful technology, it's never a good idea to stick
  13. your head in the sand (or encourage others to do so). Hence, my goal over
  14. the next few hundred pages is to present an accessible, timely, and methodical
  15. presentation on rootkit internals. All told, this book covers more topics, in
  16. greater depth, than any other book currently available. It's a compendium of
  17. ideas and code that draws its information from a broad spectrum of sources.
  18. I've dedicated the past two years of my life to ensuring that this is the case.
  19. In doing so I've waded through a vast murky swamp of poorly documented,
  20.  
  21. partially documented, and undocumented material. This book is your opportunity
  22. to hit the ground running and pick up things the easy way.
Add Comment
Please, Sign In to add comment