Cybercrime: Rootkits
http://data.open.ac.uk/openlearn/science-maths-technology/computing-and-ict/cybercrime-rootkits
is a Article , Article , Document

Outgoing links

Property Object
Subject
Creator The Open University
Publisher The Open University
Dataset
URL
Locator
See also
created Fri, 24 Oct 2014 15:36:00 +0100
Published Fri, 24 Oct 2014 15:36:00 +0100
modified
  • Fri, 24 Oct 2014 15:36:00 +0100
  • Wed, 02 Aug 2017 10:20:00 +0100
Language en-GB
Large
Small
Depiction rootkits-ats.jpg
ID 226602
From
Term
  • Computing & ICT
  • Computing and ICT
Term Criminology
tag
  • Sony
  • computers
  • cyber security
  • cybercrime
  • cybersecurity
  • digital rights management (DRM)
  • intellectual property
License Licensed under a Creative Commons Attribution - NonCommercial-ShareAlike 2.0 Licence - see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ - Original copyright The Open University
Type
Label Cybercrime: Rootkits
Title Cybercrime: Rootkits
Description
  • In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit. 
  • In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit. But what is a rootkit?
  • In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit.&nbsp; <link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/cybercrime-rootkits" /> First published on Fri, 24 Oct 2014 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/cybercrime-rootkits">Cybercrime: Rootkits</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative-Commons 2014
  • In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit.&nbsp; <link rel="canonical" href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/cybercrime-rootkits" /> First published on Fri, 24 Oct 2014 as <a href="http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/cybercrime-rootkits">Cybercrime: Rootkits</a>. To find out more visit The Open University's <a href="http://www.open.edu/openlearn/ole-home-page">Openlearn</a> website. Creative Commons BY-NC-SA 4.0 2014