Introduction
Rootkits by definition are a collection of tools used, by hackers and attackers, to gain access and “maintain command / control over any computer system” they are installed (Dunham, 2006, 2007: Zimerman, 2010). In other words, rootkits are stealth malwares that modify core system files in a manner that the user may not easily know (see Liu & Cheng, 2009, Zimerman, 2010 and Van Oorschot & Wurster, 2012). Rootkits are not only hidden systems problems; they are also a nightmare both now and in the future. In the modern world, computer security is marred by a series of threats including hacking, Trojan horses, key ...