الأربعاء، 5 أغسطس 2015

NEWS TECHNOLOGIE

Data security
The new exploit allows an application to gain root permissions via a Unix shell, all without ever needing a password. That's the kind of hack that could cripple deployed systems.

from ExtremeTech http://ift.tt/1T3c6RI

ليست هناك تعليقات:

إرسال تعليق