Why Would A Rootkit Be Used By A Hacker