Rootkits are types of malicious software that enter the system through various ways such as surfing the web, Trojan horse, and email attachments. They are developed to hide in the operating system and they install as part of the registry or master boot record. They do not aim to spread to other systems. Instead, they remain on the system where they were installed (Ciampa, 2008). Their installation on the operating system makes it hard to detect them. They can replace the commands of the operating system and affect its ability to perform. Rootkits can take total control of the system. They can determine the functions that they want the operating system to perform. The system will not be in a position to rectify the errors since they are not detected as such. Although there are programs aimed at detecting rootkits, this does not make it any easier to detect them. This is because rootkits have the capability of hiding from such detection programs (Ciampa, 2008).

Intruders such as hackers can use rootkits to attack a system. They can break into a computer, use the rootkit to introduce other malware to the system, perform unauthorized functions on the computer once they have obtained some privileges, and hide all traces of the rootkit presence from other users and antivirus software (Ciampa, 2008). The fact that rootkits cannot be detected distinguishes them from other system security threats. Rootkits can hide the presence of other malicious software such as viruses and worms. They are able to do this by hiding any traces or removing anything that can detect the presence of the malware such as log entries and login records. They are able to re-infect other parts of the systems as well (Ciampa, 2008).


Ciampa, M. (2008). Security+ guide to network security fundamentals. New York, NY: Cengage Learning  

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at Supreme Assignments, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote