Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not just that, but a strong defense would also want to show evidence that the user actually ran those commands, for example, by providing shell history files.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: