[CentOS] how to know when a system is compromised
Chris Adams
linux at cmadams.netThu Nov 14 16:57:21 UTC 2019
- Previous message: [CentOS] how to know when a system is compromised
- Next message: [CentOS] how to know when a system is compromised
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Once upon a time, Leroy Tennison <leroy at datavoiceint.com> said: > The executable could be placed on mounted read-only media That's not as secure as you think. Linux bind mounts can mount a file over another file (plus there's overlay filesystems), so it's possible to replace a binary even on a read-only device. -- Chris Adams <linux at cmadams.net>
- Previous message: [CentOS] how to know when a system is compromised
- Next message: [CentOS] how to know when a system is compromised
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list