Google
HomeCool SitesGamesGuidesStuff
Download free anti-Rootkit software

Download AVG Rootkit Free

 

AVG Anti-Rootkit Free


AVG Anti-Rootkit is a powerful tool with state-of-the-art technology for detection and removal of rootkits. Rootkits are used to hide the presence of a malicious object like trojans or keyloggers on your computer. If a threat uses rootkit technology to hide itself it is very hard to find the malware on your PC. AVG Anti-Rootkit gives you the power to find and delete the rootkit and to uncover the threat the rootkit is hiding.

Highlights

  • Powerful cleaning due to advanced cleaning driver
  • Easy to use interface
  • Fast and efficient detection (even for NTFS-ADS objects)
  • Special interface for visually impaired people

f running on Windows Vista you must run as administrator. Right click on icon and choose run as administrator.

 

Download AVG Rootkit detector and removal

A bit more about Rootkits

Rootkits are a relativly new kind of threat unlike a virus or trojan they are not malicious themselves but a technology used to hide the malicious code from antivirus and spyware programs. Until recently, I had heard about them but never found an infected computer. That was until I spent the day trying to repair a computer which was showing the symptons of a virus or spyware but no matter which tools I used I could not detect anything. I then tried a rootkit detector and in 5 mins the problem was solved.

A rootkit can take full control of a system. A rootkit's only purpose is to hide files, network connections, memory addresses, or registry entries from other programs used by system administrators to detect intended or unintended special privilege accesses to the computer resources. However, a rootkit may be incorporated with other files which have other purposes.

It is important to note that the utilities bundled with the rootkit may be malicious in intent, but a rootkit is essentially a technology; it may be used for both productive and destructive purposes. A rootkit is often used to hide utilities. These are often used to abuse a compromised system,and often include so-called "backdoors" to help the attacker subsequently access the system more easily. For example, the rootkit may hide an application that spawns a shell when the attacker connects to a particular network port on the system. Kernel rootkits may include similar functionality.

A backdoor may also allow processes started by a non-privileged user to execute functions normally reserved for the superuser. All sorts of other tools useful for abuse can be hidden using rootkits. This includes tools for further attacks against computer systems which the compromised system communicates with, such as sniffers and keyloggers. A possible abuse is to use a compromised computer as a staging ground for further abuse (see zombie computer). This is often done to make the abuse appear to originate from the compromised system or network instead of the attacker. Tools for this can include denial-of-service attack tools, tools to relay chat sessions, and e-mail spam attacks.

A major use for rootkits is allowing the programmer of the rootkit to see and access user names and log-in information for sites that require them. The programmer of the rootkit can store unique sets of log-in information from many different computers. This makes the rootkits extremely hazardous, as it allows trojans to access this personal information while the rootkit covers it up.

 

Remember to also protect your computer with Anti-Virus & Anti Spyware software

See my free utilities download page or have a read of my article on Spyware for more information.

 

About Us | Contact Us