Bootkit

Bootkit: How to Detect and Prevent This Stealthy Threat