This paper helps to create a better understanding of rootkits and its effects. Also, this paper discusses how to monitor for a rootkit, and the steps that need to be taken to remove one.