• @TheGrandNagus
    link
    English
    31 year ago

    If it has kernel level access and can run arbitrary code, that’s a rootkit.

    It’s absolutely valid to call these systems rootkits.