• JimboDHimbo@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    6 months ago

    not all rootkits are made to do that. So yes in some cases, throw it in the trash. In others, remediate your machine and move on.

    • Barbarian@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      6 months ago

      Outside of monitoring individual packets outside of your computer (as in, man in the middle yourself with a spare computer and hoping the malware phones home right when you’re looking) there’s no way of knowing.

      Once ring 0 is compromised, nothing your computer says can be trusted. A compromised OS can lie to anti-malware scanners, hide things from the installed software list and process manager, and just generally not show you what it doesnt want to show you. “Just remediate” does not work with rootkits.

      • JimboDHimbo@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 months ago

        Dude… That’s fucked. They should really go a little more in depth on rootkits in the CompTIA A+ study material. I mean, I get that it’s supposed to be a foundational over view of most IT concepts, but it would have helped me not look dumb.