In Part II of this series, we looked at how we could be hiding our rootkit’s thread from the eyes of a vigilant anti-roo