Originally posted by DrYak
View Post
confine privilige escalation attacks to write to the system unless the attacker is good enough to first recognize that they are "in jail," then manage to break out of the chroot.
Yet another use is attack-proofing public computers, so a simple reboot kills any problems from a previous user. One community college whose Internet access I used to poach somehow managed to do this in Windows as though they were running from live disks, I was very impressed with that. Was good for privacy too: just mash the button if you needed to remove your work and all software you had added, due to this they were able to allow a lot of user software to be installed if it did not require driver installation privilige levels.
Leave a comment: