a hacker technology, for installing hostile programs on your system, while they remain undetected and trick the system into making it look like nothing at all is going on
a "kit" consisting of small and useful programs that allow an attacker to maintain access to " root ," the most powerful user on a computer
an assembly of programs that subverts the Windows operating system at the lowest levels, and, once in place, cannot be detected by conventional means
a package of scripts and programs that a hacker installs on a host once the hacker has already compromised the system and gained administrative access
a program that allows files, folders, and registry entries to be hidden from other programs
a series of modified programs all centered around the idea of helping you to keep access to a Unix system once you have gained root priveleges there
a set of computer files that are installed on your computer to mimic Operating System (or commonly used programs) files
a specially formulated piece of malware that gives a hacker full administrator rights to an infected PC, allowing them to change and copy data at will