This document summarizes information presented at a seminar on computer security and protection against hacking techniques like rootkits and keyloggers. It defines rootkits as software that hides within an operating system to enable privileged access without detection. Various types of rootkits are described, including ways they can bypass security measures. Detection and removal tools are listed. Keyloggers are explained as programs that covertly record keyboard input to steal login credentials and other sensitive data. Software-based, hardware-based, and other keylogger types and the damage they can enable are covered. Finally, countermeasures like antivirus software, key scramblers, and antilogger programs are recommended.