{"id":656432,"date":"2013-05-06T19:34:26","date_gmt":"2013-05-06T23:34:26","guid":{"rendered":"http:\/\/betanews.com\/?p=147902"},"modified":"2013-05-06T19:34:26","modified_gmt":"2013-05-06T23:34:26","slug":"trend-micro-rootkit-buster-lives-up-to-its-name","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/656432","title":{"rendered":"Trend Micro Rootkit Buster lives up to its name"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/betanews.com\/wp-content\/uploads\/2011\/09\/shutterstock_76478644-e1314985904552-600x312.jpg\" alt=\"\" title=\"security\" width=\"600\" height=\"312\" class=\"alignnone size-large wp-image-32885\" \/><\/p>\n<p>Anti-rootkit tools used to be bulky, complex, packed with so much low-level jargon that even most Windows experts might struggle to figure out what was going on. And they were risky to use, too, with the authors often employing unauthorised low-level coding tricks which could easily blue-screen your PC just by running a regular scan.<\/p>\n<p>If you know what you\u2019re doing then there\u2019s still scope for a little low-level Windows exploration, of course, but most people just want something which will check their PC for threats, finding and removing them with the maximum speed, and minimum hassle. And that\u2019s just what you get with<a title=\"Trend Micro Rootkit Buster (64-bit)\" href=\"http:\/\/www.downloadcrew.com\/article\/30196-trend_micro_rootkit_buster_beta_5001129_64-bit\" >Trend Micro Rootkit Buster<\/a>.<\/p>\n<p>The program comes in both\u00a0<a title=\"Trend Micro Rootkit Buster (32-bit)\" href=\"http:\/\/www.downloadcrew.com\/article\/30195-trend_micro_rootkit_buster_beta_5001129_32-bit\" >32-bit<\/a>\u00a0and\u00a0<a title=\"Trend Micro Rootkit Buster (64-bit)\" href=\"http:\/\/www.downloadcrew.com\/article\/30196-trend_micro_rootkit_buster_beta_5001129_64-bit\" >64-bit<\/a>\u00a0flavors, for instance (make sure you get the right one for your system), and both builds are portable. They\u2019re not even zipped up \u2013 just download the relevant executable and launch it.<\/p>\n<p>The Rootkit Buster interface is just as simple and straightforward. The program organizes the system areas it can check into three main areas &#8212; \u201cFiles or Master Boot Records\u201d, \u201cServices\u201d and \u201cKernel Code Patches\u201d &#8212; and each of these can optionally be disabled, if you can think of a good reason to do so.<\/p>\n<p>Generally, though, all you then have to do is click \u201cScan Now, and watch as Rootkit Buster scans the system areas you\u2019ve specified, delivering its verdict and disabling any threats (if present) in little more than a second.<\/p>\n<p>As its extreme speed suggests, this isn\u2019t the most thorough of security health checks, and Trend Micro Rootkit Buster is no substitute for a regularly updated, full-strength antivirus tool.<\/p>\n<p>The program is convenient and easy to use, though. And new support for detecting malicious Master Boot Record modifications mean\u00a0<a title=\"Trend Micro Rootkit Buster (64-bit)\" href=\"http:\/\/www.downloadcrew.com\/article\/30196-trend_micro_rootkit_buster_beta_5001129_64-bit\" >Trend Micro Rootkit Buster<\/a>\u00a0should be notably better at spotting and disabling at least some rootkits. So while it\u2019s a little on the basic side, we\u2019d recommend keeping a copy around, just in case you\u2019re infected by something which your regular security package can\u2019t remove.<\/p>\n<p><strong>Photo Credit:<\/strong> <a href=\"http:\/\/www.shutterstock.com\/gallery-496243p1.html\" >alexskopje<\/a>\/<a href=\"http:\/\/www.shutterstock.com\/gallery-496243p1.html\" >Shutterstock<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=J8lVxP3x3PE:UfFoQQ4W6ZQ:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.betanews.com\/~ff\/bn?a=J8lVxP3x3PE:UfFoQQ4W6ZQ:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/bn?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/bn\/~4\/J8lVxP3x3PE\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anti-rootkit tools used to be bulky, complex, packed with so much low-level jargon that even most Windows experts might struggle to figure out what was going on. And they were risky to use, too, with the authors often employing unauthorised low-level coding tricks which could easily blue-screen your PC just by running a regular scan. [&hellip;]<\/p>\n","protected":false},"author":7429,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-656432","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/656432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/7429"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=656432"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/656432\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=656432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=656432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=656432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}