I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.
到目前为止,我已经把所有内核进行内存管理的重要的数据结构介绍了一遍,接下来,我们就可以用前面所讲的知识来对目标计算机进行物理内存镜像的分析了。
Earlier this month, a problem was discovered in Google's new web browser, Google Chrome, that would have allowed an attacker to launch and run scripts on a compromised machine.
本月初的时候,有人在Google Chrome浏览器里发现了一个问题,允许攻击者在中招的电脑上启动并运行脚本。
So, what happens when data stored on a virtual machine get compromised?
那么,如果存储在虚拟机的数据失去安全保障时怎么办?
应用推荐