I have the same qeuestion, also what is the methodology used for discovering 
rootkit?

Reply via email to