4. For example, a rootkit can modify system logs so as that all references to its insertion, to log-ins by the intruder and to the running of programs by the rootkit are either not recorded or are deleted. Apart from the irritating fact that your computer will not work as well as before, your personal information could get into the wrong hands.Once this program has done its work go on