Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
How to create shellcode How to inject code How to hide processes, files, directories and registry entries How to keep a rootkit in a system How to create a backdoor How to create an invisible keylogger and remote console How to make a screenshot Creating undetectable applications How to deceive Anti-Virus applications How to use anti-emulation techniques How to bypass a firewall How to create a rootkit detector How to protect against rootkits