6.14. Rootkits Notes | Information Security BIM | TU | TABFlux