Chapter 8. Hardware Manipulation
Throughout your life, advance daily, becoming more skillful than yesterday, more skillful than today. This is never-ending. | ||
--HAGAKURE |
A scenario:
The intruder slips along the wall toward a janitor cart resting at the end of the hall. His eyes are on a set of keys. A quick look around the corner; good, the janitor is down the hall cleaning a doctor’s office. The intruder gently lifts the key chain and dashes back into the dark hallway. Around a corner, stopping at a door, he tries the lock. This doesn’t take long. Once the door is open, he sneaks back to the cart and replaces the keys.
The office is dark except for a computer terminal in the back. After moving the monitor and keyboard to the floor, he sits in the ...
Get Rootkits: Subverting the Windows Kernel now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.