<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>rootkit boot time — Expert Community</title>
        <link>https://community.bitdefender.com/en/</link>
        <pubDate>Thu, 03 Oct 2024 22:10:48 +0000</pubDate>
        <language>en</language>
            <description>rootkit boot time — Expert Community</description>
    <atom:link href="https://community.bitdefender.com/en/discussions/tagged/rootkit-boot-time/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Hacker Malware VIRTOOL:Win32\DefenderTamperingRestore</title>
        <link>https://community.bitdefender.com/en/discussion/93348/hacker-malware-virtool-win32-defendertamperingrestore</link>
        <pubDate>Sun, 11 Sep 2022 12:14:51 +0000</pubDate>
        <category>Protection - Malware/ Firmware/etc.</category>
        <dc:creator>groucho43</dc:creator>
        <guid isPermaLink="false">93348@/en/discussions</guid>
        <description><![CDATA[<p>I have been suffering from this malware, which disables the Windows Defender services and gives the hacker control of my PC, for a long time. Also from RemoteAdmin:win32\ConnectScreen. I have gone through numerous re-installations but the malware always returns (and the hacker, who prevents me from doing everyday tasks). Any assistance will be very much appreciated. My system is Windows 11 Pro.</p>]]>
        </description>
    </item>
    <item>
        <title>How does BD protect against boot time rootkits?</title>
        <link>https://community.bitdefender.com/en/discussion/74185/how-does-bd-protect-against-boot-time-rootkits</link>
        <pubDate>Fri, 09 Dec 2016 16:41:31 +0000</pubDate>
        <category>Protection</category>
        <dc:creator>alokep</dc:creator>
        <guid isPermaLink="false">74185@/en/discussions</guid>
        <description><![CDATA[<p>
	Like the title says: it appears that BD loads after a significant part of Windows gets loaded.
</p>

<p>
	How does it defend (in normal mode of operations, not booting off some rescue disk ...) against rootkits that load before the OS?
</p>

<p>
	Aloke
</p>]]>
        </description>
    </item>
   </channel>
</rss>
