This documentation discusses a way to scan your system for Rootkits. The information provided is not meant to replace common security practices, but might prove useful when used in conjunction with these practices.