Displaying 1 result from an estimated 1 matches for "ynl3cykeinegx0h".
2019 Nov 14
2
how to know when a system is compromised
Once upon a time, Leroy Tennison <leroy at datavoiceint.com> said:
> The executable could be placed on mounted read-only media
That's not as secure as you think. Linux bind mounts can mount a file
over another file (plus there's overlay filesystems), so it's possible
to replace a binary even on a read-only device.
--
Chris Adams <linux at cmadams.net>