Blog

ZeroAccess Rootkit

Posted by:

ZeroAccess Rootkit was discovered in November 2011 and has been causing havoc ever since.

It works by using and infected file from a package with a trusted certificate and then imbeds itself into system files such as svchost and loads the mimicked dll file instead of the original.

It is a Trojan Horse that opens a backdoor to download its own files.

This is one of the nastiest viruses around to date and can be extremely difficult to remove.

I ...

Continue Reading →
0

Welcome

Posted by:

Welcome
This is exciting, my first blog, written on the phone and sent directly to the blog on my website.

I’d just like to welcome you to the Radford Computing website and in particular to our blog, where I hope you’ll find the information here useful and interesting.

If you want to ask any questions, leave a comment or use the contact form if it’s private.

Many thanks

Adrian

Continue Reading →
0

# #