User: Password:
|
|
Subscribe / Log in / New account

Threat models for embedded devices

Threat models for embedded devices

Posted Jul 4, 2010 22:47 UTC (Sun) by oak (guest, #2786)
In reply to: Threat models for embedded devices by nix
Parent article: Threat models for embedded devices

That's only valid until such processes themselves (or their children inheriting the property) exhaust the memory...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds