Disclaimer: The views expressed in this article are those of the author and not of his employer, fellow employee lackies or friends and cohorts.
How long until the bad guys integrate code to trick operating systems into generating false log entries to obviscae the real attack.
This is another reason to watch he traffic on the wire and not rely on log entry correlation as a defense.
S. Russell Dyer. BS CE CISSP CRISC Security+
Security Analyst and I.T Guru.
No comments:
Post a Comment