Chapter 2/ Overview of Anti-Forensics

Wondershare

the bottom floor, beneath the sub-bascmcnt of system-level software: to the

processor. Inevitably, if you go far enough down the rabbit hole, your pursuit

will lead you to the hardware.

Thus, we'll spend the next chapter focusing on Intel's 32-bit processor

architecture (Intel's documentation represents this class of processors using

the acronym IA-32). Once the hardware underpinnings have been fleshed out,

we'll look at how the Windows operating system uses facets of the lA-32

family to offer memory protection and implement the great divide between

kernel mode and user mode. Only then will we Anally be in a position where

we can actually broach the topic of rootkit implementation.

54 I Part I