Why is it essential that sensitive files be continually checked?
Current corporate software pirates use complete “technical kits” when attacking, some of which are even available on the Internet. These programs are used to make exhaustive and automatic scans for system vulnerability and configuration weaknesses. This means that the pirate has only to isolate a weak spot to break into the system and install a rootkit. The attacker can take over complete control of a system within a few hours and in the case where the pirate manages to infiltrate the internal network, it is essential that he be removed as soon as possible in order to limit the effects and prevent the danger from spreading.