Figure 10.6 Comparing Application-level Trojan
horse backdoors with traditional RootKits