Home Page

Geraint Williams

Information Risk Consultant & Trainer.


Trojan, exploit & rootkit: a Practical demonstration

Presentation Synopsis

Is your computer system under attack? Would you know if hackers hijacked your system and took control of your resources? This presentation will show how the attacker takes control of the system, covers their tracks from the users of the system by creating a 'backdoor' and hiding it using a 'rootkit'. You can see exactly what these and other terms such as 'trojan', 'exploit', and 'hack' actually mean when applied to a real system. Will cover some basic precautions that will help you protect your computer from being attacked

Requesting a presentation

If you represent any branch or section of the BCS, IET or other professional institute bodies, or represent an organisation, company or business in the UK and are interested in me giving this presentation, please contact me through LinkedIn or this website.


Content © 2013 Geraint Williams | Last updated 7th April 2013