surrogate-controlled scrolling
A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]

A rootkit is a collection of computer software, typically malicious, designed to enable
access to a computer or areas of its software that is not otherwise allowed (for example,
to an unauthorized user) and often masks its existence or the existence of other software.[1]
The term rootkit is a concatenation of "root" (the traditional name of the privileged account
on Unix-like operating systems) and the word "kit" (which refers to the software components
that implement the tool). The term "rootkit" has negative connotations through its association
with malware.[1]