It uses the operating system call like any application would.Leo: And then...Steve: And then a low physical...Leo: And that could not be changed by a rootkit.Steve: Well, he is the problem, is...Leo: I knew there was a problem.Steve: he is the problem, is, okay, in order to do that, the rootkit would have to intercept the lowest level hard disk call and be smart enough to edit individual hard dis