Duis mollis, est non commodo luctus, nisi erat porttitor ligula, eget lacinia odio sem nec elit. Sed posuere consectetur est at lobortis. Vestibulum id ligula porta felis euismod semper. Donec ullamcorper nulla non metus auctor fringilla. Aenean lacinia bibendum nulla sed consectetur. Cras justo odio, dapibus ac facilisis in, egestas eget quam. Cras mattis consectetur purus sit amet fermentum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. Sed posuere consectetur est at lobortis. Etiam porta sem malesuada magna mollis euismod. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Duis mollis, est non commodo luctus, nisi erat porttitor ligula, eget lacinia odio sem nec elit. Cras justo odio, dapibus ac facilisis in, egestas eget quam. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Curabitur blandit tempus porttitor. Sed posuere consectetur est at lobortis.
Hi matt thanks for your answer.
I think i hav saved the log somewhere i will serach it and provide it.
Thank you .
adi_dmj
First of all i should admit that i am not tech savy but an ordinary user who loves to read articles on internet.
NIS2008 was installed on my system and i suffred two serious system failures after that i did a google and downloaded sysinternals rootkit revealer which found many descrepancy while reporting status of norton file on disk againest as reported by explorer.
My qustion is NIS2008 is using rootkits to startsearly in windows startup could it be the reason that many sysstem which have NIS2008 installed gets unstable while booting up or simly crashes.
Please provide a simple yes or No answer i am an ordinary user who does not like any thing serious on my system
Hi adj_dmj,
The short answer is no. Here's Symantec's Security Response definition of a rootkit:
A rootkit is a component that uses stealth to maintain a persistent and undetectable presence on the machine. Actions performed by a rootkit, such as installation and any form of code execution, are done without end user consent or knowledge.
Rootkits do not infect machines by themselves like viruses or worms, but rather, seek to provide an undetectable environment for malicious code to execute. Attackers will typically leverage vulnerabilities in the target machine, or use social engineering techniques, to manually install rootkits. Or, in some cases, rootkits can be installed automatically upon execution of a virus or worm or simply even by browsing to a malicious website.
Once installed, an attacker can perform virtually any function on the system to include remote access, eavesdropping, as well as hide processes, files, registry keys and communication channels.
The United States Computer Emergency Readiness Team (US-CERT) has some additional information that you may find valuable here.
If you can provide additional information about what exactly the results of the rootkit revealer were I'm sure we can provide you more specific information.
Thanks,
Matt