A set of
trojaned files to replace system commands to hide one's presence on a computer system, typically for
unix systems, however one for
NT exists.
These files are modified copies of the original ones to bypass system logfiles, user processes, disk space usage, file date/time stamps, and much more. These typically come with a
trojaned login program that stores all user/passwords to a hidden file somewhere, thus making more of the computer
network more vulnerable.