How access to the rootkit is secured.