Anonymous user
Deadbolt Operating System Hardening: Difference between revisions
Deadbolt Operating System Hardening (view source)
Revision as of 16:16, 11 March 2024
, 11 March 2024no edit summary
No edit summary |
No edit summary |
||
Line 23: | Line 23: | ||
He says sophisticated hacks can get to the operating system kernel and interrupt it, or divert it, so that illicit code can run before it’s detected. “My thinking was … I’m going to make it so that the thing that actually does the loading does the check itself, so it’s impossible for you to separate it from the loading process.” | He says sophisticated hacks can get to the operating system kernel and interrupt it, or divert it, so that illicit code can run before it’s detected. “My thinking was … I’m going to make it so that the thing that actually does the loading does the check itself, so it’s impossible for you to separate it from the loading process.” | ||
[[Category:Ric Richardson Inventions]] | |||
[[Category:Australian Inventions]] | |||
__NOEDITSECTION__ |