Last month we discussed potentially unwanted programs that use rootkit components to protect some of their files and registry keys against modification and removal.
This month we will illustrate other self-protection methods that complicate removal and/or disabling potentially unwanted applications.