Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Systems like that are only a privilege escalation away from being compromised and are much softer targets. Anything with shell access for multiple parties not known intimately to the owner of the box should be monitored with great zeal.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: