30º Ene 2015
The GHOST vulnerability – what you need to know
In the last couple of days, a widespread Linux vulnerability known as GHOST has been receiving a lot of attention in the security community. In theory, this vulnerability can allow an attacker to remotely execute code on a Linux computer. There is already proof of concept code that puts this theory into practice, and it is expected that real world ...
Powered by WHMCompleteSolution