| http://www.w3.org/ns/prov#value | - While sophisticated rootkits are very common in targeting most of today???s popular operating systems, including Windows, Linux, Unix and any variant of those platforms, consider a rootkit that transcends a device???s operating system and can tap into the deepest levels of its firmware, giving attackers the ability to take almost complete control of the system -- and to turn the rootkit on and off
|