{"id":8173,"date":"2013-01-11T14:45:50","date_gmt":"2013-01-11T14:45:50","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/bios-rootkit\/"},"modified":"2013-01-11T14:45:50","modified_gmt":"2013-01-11T14:45:50","slug":"bios-rootkit","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/15943\/bios-rootkit","title":{"rendered":"BIOS Rootkit"},"content":{"rendered":"
A BIOS rootkit is a type of application that resides within a computer\u2019s memory hardware and is used for remote system access and monitoring. A BIOS rootkit allows system administrators and original equipment manufacturers to remotely access and update a system. It is stored and accessed from the computer\u2019s physical memory (RAM).<\/p>\n
A BIOS rootkit is primarily designed by computer hardware manufacturer for different administrative purposes such as BIOS updates, device registration, and other tasks. Traditionally, the BIOS rootkit was non-erasable and editable. Modern systems now come equipped with a modifiable rootkit, which is stored within an integrated flash memory. A BIOS rootkit is generally persistent, and is not affected by hard drive failure or replacement.<\/p>\n
A BIOS rootkit can also be exploited by hackers and crackers to illegitimately gain access to a system. In such an event, it is infested with a malicious code, which is generally undetectable, although it can be removed by most anti-virus and security software.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does BIOS Rootkit Mean? A BIOS rootkit is a type of application that resides within a computer\u2019s memory hardware and is used for remote system access and monitoring. A BIOS rootkit allows system administrators and original equipment manufacturers to remotely access and update a system. It is stored and accessed from the computer\u2019s physical […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,217],"class_list":["post-8173","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-hardware"],"acf":[],"yoast_head":"\n