blocking rootkits using virtualization

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello guys,
    I was going through kernelnewbies.org and came across a project "Block Rootkits using Virtualization" by riel.
     Basically we have to make kernel read only after boot process completes so rootkits get blocked. 
     I have few doubts...

--Is the method of making kernel read only to block rootkits used in linux kernel mainline?

--have anybody implenented this project already?

--what is the good way to start with above project?

--any guidelines to implemnet above project??

--can I get any menor??

--any material related to above project??

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@xxxxxxxxxxxxxxxxx
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux