As you work through the examples in this book, you may choose either to type in all the code manually or to use the source code files that accompany the book. All of the source code used in this book is available for download at www.wrox.com. Once at the site, simply locate the book’s title (either by using the Search box or by using one of the title lists) and click the Download Code link on the book’s detail page to obtain all the source code for the book.
Because many books have similar titles, you may find it easiest to search by ISBN; this book’s ISBN is 978-0-470-10154-4.
Once you download the code, just decompress it with your favorite compression tool. Alternately, you can go to the main Wrox code download page at www.wrox.com/dynamic/books/download.aspx to see the code available for this book and all other Wrox books.
Before you extract the Professional Rootkits archive, you will need to disable any anti-virus software running on your machine. Most (if not all) of the material covered in this book is considered harmful. As such, any good anti-virus software will do everything it can to prevent the transfer of these harmful files to your computer, so you will need to disable your anti-virus software or exclude your rootkit files from anti-virus protection whenever you are working with known rootkits. Of course, you will be writing never-before-seen rootkits soon, but until then, you will need to disable or reconfigure your anti-virus software.
If you don’t already have an archive tool to unzip the Wrox/Wiley download file, I recommend ZipCentral. This is absolutely free software offered without banners, spyware, or a 30-day trial. Just download zcsetup.exe from http://hemsidor.torget.se/users/z/zcentral/down.html and double-click it to install ZipCentral. Once installed, you can drag and drop archives onto the application or its desktop icon, and extract these archives to the directory of your choosing.
The extracted archive files are divided into individual chapters containing the source code, executables, and drivers mentioned in that chapter. If you intend to follow along without compiling the examples in these chapters, you can use the binaries provided for each chapter on any Windows 2000, XP, or 2003 operating system. If you intend to compile (and hopefully adapt) the source code provided, you will first need to build a rootkit toolkit, which is the topic of Chapter 1.