Technical Mujahideen magazine: how to use rootkits to hide incriminating data.