Maintaining Access 1 Maintaining Access Maintaining Access 2 In This Chapter… Trojans Backdoors Rootkits.