他终于有了完全属于他自己的车。
现在,他试图用来与网络交互的任何进程都属于他自己的用户标识。
Now, any processes that he tries to use to interact with the network will be owned by his UID.
比如说,当某个用户正在进行在线转帐操作时,攻击者把目标帐户修改为属于他自己的帐户也是可行的。
For example, as a user is making an online money transfer, it is possible for an attacker to change the destination account to one that belongs to him.
应用推荐