• Barbarian@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    ·
    6 months ago

    Outside of monitoring individual packets outside of your computer (as in, man in the middle yourself with a spare computer and hoping the malware phones home right when you’re looking) there’s no way of knowing.

    Once ring 0 is compromised, nothing your computer says can be trusted. A compromised OS can lie to anti-malware scanners, hide things from the installed software list and process manager, and just generally not show you what it doesnt want to show you. “Just remediate” does not work with rootkits.

    • JimboDHimbo@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      ·
      6 months ago

      Dude… That’s fucked. They should really go a little more in depth on rootkits in the CompTIA A+ study material. I mean, I get that it’s supposed to be a foundational over view of most IT concepts, but it would have helped me not look dumb.