Ladies and gentlemen we've been witnessing a lot of trojan authors creating and selling private/custom builds of their trojans over the last couple of years in particular, but now the author of one of the most advanced rootkits for Windows ("Hacker Defender") is making private, undetected builds of his wares available. This is of particular concern to the public because the rootkit servers he is making are not only undetected by anti-virus software, but also anti-rootkit software. We've made a copy of his page (after removing the hyperlink targets and his email address) and it is available for all to see at http://www.diamondcs.com.au/processguard/hdprivate.htm ... However ... . While these rootkit servers may be undetected by all scanners (including our own TDS), their infection can still be stopped and prevented completely simply by proactively blocking the installation of their kernel-mode component, as demonstrated here. Still to this day only one program has properly demonstrated this with all known methods of kernel driver installation (there are several), against all known Windows rootkits, and enabling this level of protection is as simple as turning on one checkbox - "Block Rootkit/Driver/Service Installation" So for ProcessGuard users there's nothing to worry about, enjoy your weekend folks.