Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Reverse engineering the modern ZeroAccess rootkit, step by step (infosecinstitute.com)
2 points by JonnieCache on Dec 13, 2010 | hide | past | favorite


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: