I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.
到目前为止,我已经把所有内核进行内存管理的重要的数据结构介绍了一遍,接下来,我们就可以用前面所讲的知识来对目标计算机进行物理内存镜像的分析了。
Earlier this month, a problem was discovered in Google's new web browser, Google Chrome, that would have allowed an attacker to launch and run scripts on a compromised machine.
本月初的时候,有人在GoogleChrome浏览器里发现了一个问题,允许攻击者在中招的电脑上启动并运行脚本。
So, what happens when data stored on a virtual machine get compromised?
那么,如果存储在虚拟机的数据失去安全保障时怎么办?
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
As with any other Web applications, it is best to end the browser session to be safe of any future exploits, if the user's machine is compromised.
与任何其他Web应用程序一样,如果用户的机器的安全性受到威胁的话,最好结束浏览器会话以规避将来的安全隐患。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done.
然后还有对已经损害一台机器的一位黑客采取行动的合法性,终究沉重的辩论学被做。
Then there's also the legality of taking action against a hacker who has compromised a machine, after all the heavy forensics are done.
然后还有对已经损害一台机器的一位黑客采取行动的合法性,终究沉重的辩论学被做。
应用推荐