I should start by voicing my great irritation toward the version meme applied to the commercial operating systems: v6 now allows you to do this instead of that, how wonderful. Except, doing this is a ...
At Black Hat Europe in mid-April 2009, Anthony Lineberry presented an interesting paper on how attackers with root privileges might use a /dev/mem rootkit, hiding their attacks by directly altering ...