I'll give the tool a try.
But as far as different methods of detecting a RK, I of course have done remote analyzation and in general for a decently adept computer guy finding them is not the issue, even without great tools such as RR. The trick is how to make a tool like RR that allows even a noveice to know whether or not they are compromised, and of course have that tool be free & open, and in perl!, or I'd even settle for being wrapped by perl.
But i think first I need to learn about things I have not done before like accessing the disk directly