3 Rootkits

 3.1 Nature
 3.2 Vector
 3.3 Detection
  3.3.1 Checksum monitors
  3.3.2 Rootkit detectors