Exploit, Trojan, and Rootkit: a Practical Demonstration
Wednesday, 22 February 2012, 8:00pm - 9:30pm
Geraint Williams, Infosec Trainer and Consultant, IT Governance.
Is your computer system under attack? Would you know if hackers hijacked your system and took control of your resources? This presentation will show how the attacker takes control of the system, cover their tracks from the users of the system by creating a ‘backdoor’ and hiding it using a ‘rootkit’. You can see exactly what these and other terms such as ‘exploit’, ‘trojan’, and ‘rootkit’ actually mean when applied to a real system. The speaker will cover some basic precautions that will help you protect your computer from being attacked.
Location
Steria Limited, Hemel Hempstead
Three Cherry Trees Lane, Hemel Hempstead, HP2 7AH
Cost
Free for members and non-members
Last updated 12th November, 2023 at 11:43am