| < Day Day Up > | 
|   In order to understand how rootkits can be used to subvert an OS kernel, it helps to know which functions the kernel handles. Table 2-1 describes each major functional component of the kernel. 
 Now that we have an idea of the functions of the kernel, we will discuss how a rootkit might be designed to modify the kernel.  | 
| < Day Day Up > |