INTRODUCTION
Background of the study The Internet is no longer the safe place it was years ago. Malware, or malicious software, is on the rise and can be found in all corners of the Web. By simply navigating to a website or opening an email, you are at risk infecting your computer. Malware takes the form of code, scripts content and even the legitimate software to obtain access to your computer and the personnel information it houses. Most malware programs will reinstall themselves even after you think they have been removed. They typically hide deep within the Windows registry making them difficult to manually remove. When this occurs, your computer may become so unstable that installing a malware removal tool may be impossible. Based on our research, it is difficult to pinpoint exactly when root kits were first used by malicious hackers who compromising windows machines (after all, the goal of a root kit is to allow the malicious hackers to go undetected for as long as possible), but it has become generally accepted that one of the first individuals to thrust root kit technology for windows into the limelight was Greg Hoglund, when he posted a description of an NT-based root kit to the Phrack online magazine in fall of 1999. This posting not only attempted to describe and further refine the definition of a root kit for windows , but it is also described a simple 4-byte patch that could be made to the window NT kernel to disable access and security checks allowing unprivileged users access to privileged. From there Hoglund went to create what is generally considered to be one of the first true Windows NT kernel-mode root kits and register the domain rootkit.com in March 1999; and he helped create an actively growing online community of people devoted to furthering work in the area of achieving and maintaining stealth. He also teaching classes entitled “Aspects of offensive root kit Technology” that taught students how to develop their own kernel
References: Vermaat, Shelly. 2010. Discovering Computers Fundamentals 5th edition. International Student Edition. p.364 Vermaat, Shelly AP”Computer virus causes havoc on systems worldwide”. The Manila Bulletin. (May 06, 2000). p.329 (6):1-6 AP”Love bug variant wreaks more havoc” AP”FBI warms of new computer virus”. The Philippine Star. (May 28, 2000).p. (303):5 Meyer, Henry “New Internet worm from Russian ISPS?” Nazareno, rocky ‘Love bug’ suspect detained’. The Philippine Daily Inquirer. (May 09, 2000).p.15 (151) Ocampo, Jurep “Cashing in on the Love Bug’, The Philippine Star Ofrin, Roderico H. “Will Y2K bug our health?’. The Philippine Daily Inquirer. (December 13, 1999)15 (5) C-10 Villafuerte, Nelly F Waldman, Simon “Malicious porn virus ‘Melissa’ wreaks havoc in cyberspace”. The Manila Bulletin. (April 13, 1999).p.316 (13): 55-2 Winton, Neil “Y2K bug dormant but huge cost questioned” _____ “Computer-virus threats on the rise “. The Manila Bulletin. (December 05, 1999) XIII (296): 16 Internet