All > Technology > Security
A set of tools used by an attacker after gaining root-level access to a host to conceal the attackers activities on the host and permit the attacker to maintain root-level access to the host through covert means.
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim