Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:The fact is (Score 3, Insightful) 223

It is possible to circumvent any single method of detection. And it's even possible to circumvent circumvention detection. In the real world this would become an arms race: security experts would find a way to detect the root-kit, and the next one would be able to evade that method of detection. Eventually, however, the hypervisor would spend enough cycles evading detection that the user would get tired of his bogged down machine and would just reinstall the OS.

I don't disagree with her theory, but in practice it is difficult enough to achieve that it will probably never happen.

Slashdot Top Deals

To get something done, a committee should consist of no more than three persons, two of them absent.

Working...