Invisible Intruders: Rootkits in Practice