Development of new technologies thrown up new kinds of dangers for companies and end users. Most of time, attackers aim to gain full access on victim’s private systems, this operation is also known as “Be root” or “Have a rooted system”. Attackers are then, able to use the rooted computer, as if they were the owner of it, without his permission. Consequences can be dramatic. Computer Security includes all the techniques, skills and methodologies to ensure the integrity of automated information systems of all kind, and protect them against threats.