Because ‘generally’, something that is hidden is seen as ‘suspect’. You have to know what is on your system, and why, if you are to get comfortable using these two tools. That either of them ‘identifies’ something doesn’t automatically mean that what has been identified is a real threat.
It is highly unlikely that you would ever encounter a rootkit on your system. You would have to be running your system ‘wide open’ to the world or doing extremely risking things on your system (booting into and running your system ‘as root’ all the time). I’m reasonably sure that isn’t your case.
Why do you think you need/want these two tools?
It is highly unlikely that you would ever encounter a rootkit on your system. You would have to be running your system ‘wide open’ to the world or doing extremely risking things on your system (booting into and running your system ‘as root’ all the time). I’m reasonably sure that isn’t your case.
Why do you think you need/want these two tools?
Comment