As shown above, su can also be controlled so that Encryption Expert will prevent even the root user from accessing guard points by pretending to be some user.
如上所述,还可以控制su,从而使EncryptionExpert甚至可以阻止伪装成其他用户的根用户访问保护点。
If the root user reads data from the guard point, data is not decrypted, and the action is logged for audit.
如果根用户从保护点读取数据,那么数据将不被解密,并且会记录该操作用于审计。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
应用推荐