6 Conventions

stand the limits of certain tools so that they can achieve a degree of indepen¬

dence from them. You are not your tools; tools are just labor-saving devices

that can be effective only when guided by a battle-tested hand.

Finally, security used to be an obscure area of specialization: an add-on fea¬

ture, if you will, an afterthought. With everyone and his brother piling onto

the Internet, however, this is no longer the case. Everyone needs to be aware

of the need for security. As I watch the current generation of users grow up

with broadband connectivity, I can't help but cringe when I see how brazenly

many of these youngsters click on links and activate browser plug-ins. Oh,

the horror, . . . the horror. I want to yell: "Hey, get off that social networking

site! What are you? Nuts?" Hence, this book is also for anyone who's curious

enough (or perhaps enlightened enough) to want to know why rootkits can be

so hard to eradicate,

5 Prerequisites

Stealth technology, for the most part, targets system-level structures. Since

the dawn of UNIX, the C programming language has been the native tongue

of conventional operating systems. File systems, thread schedulers, hardware

drivers; they're all implemented in C. Given that, all of the sample code in

this book is implemented using a mixture of C and Intel assembler.

In the interest of keeping this tome below the 5-pound limit, I have assumed

that readers are familiar with both of these languages. If this is not the case,

then I'd recommend picking up one of the many books available on these

specific languages,

6 Conventions_

This book is a mishmash of source code, screen output, hex dumps, and hid¬

den messages. To help keep things separate, I've adopted certain formatting

rules,

The following items arc displayed using the Letter Gothic font:

File names.

Registry keys.

Programmatic literals.

Screen output.

xxix