Figure 10.6 Comparing Application-level Trojan horse backdoors with traditional RootKits