How to Uproot Rootkit Threats?