Computer Forensics Challenge 3: Analyze a hacker rootkit 
Here is a hacker rootkit.
Analyze the rootkit and figure out what does this rootkit do.
-  how it installs the trojan horse programs 
 
    -  what information do these trojan horse programs try to hide 
 
    -  how it affects the victim kernel
 
    -  ... etc