Analysis of windows rootkits's stealth and detection technologies