Citat:
According to research published on Monday by GFI Software, the latest TDL4 installation penetrates 64-bit versions
of Windows by bypassing the OS's kernel mode code signing policy, which is designed to allow drivers to be installed only when
they have been digitally signed by a trusted source. The rootkit achieves this feat by attaching itself to the master boot record
in a hard drive's bowels and changing the machine's boot options.
of Windows by bypassing the OS's kernel mode code signing policy, which is designed to allow drivers to be installed only when
they have been digitally signed by a trusted source. The rootkit achieves this feat by attaching itself to the master boot record
in a hard drive's bowels and changing the machine's boot options.
Umjesto da konacno raskrste sa nepismenim i nekompetentim programerima driver-a oni opet po starom

Dzabe ti anti-theft vrata kad je kljuc ispod otiraca.
A prelazak na x64 je bio tako dobra prilika da se zrtvuje compatibility u korist sigurnosti....