Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is what audit records are for. Unless you expect the bad guys to respect your schedule, you won't be around to see the LED light.


Google "rootkit". This is a great example of theoretical security vs actual security. In theory, people review logs on their personal machines and hunt for bad guys. In practice, virtually nobody has ever done that. The reality is that personal laptop compromises are discovered through side-effects. Heat, sluggishness, webcam turning on, accounts being hijacked.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: