Skip to content
Skip to main content
  • Video
  • 5 minutes

Cybercrime: Rootkits

Updated Wednesday, 2 August 2017
In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit. But what is a rootkit?

This page was published over 6 years ago. Please be aware that due to the passage of time, the information provided on this page may be out of date or otherwise inaccurate, and any views or opinions expressed may no longer be relevant. Some technical elements such as audio-visual and interactive media may no longer work. For more detail, see how we deal with older content.

PDF document Transcript 99.3 KB

 

Become an OU student

Ratings & Comments

Share this free course

Copyright information

Skip Rate and Review

For further information, take a look at our frequently asked questions which may give you the support you need.

Have a question?