6.14. Rootkits Visual Notes | Information Security BIM | TU | TABFlux