记录系统活动的程序也能做类似的修改,从而当系统管理员检查日志时,尽管系统已处于危险之中,但一切看来都正常。
Programs that log system activities can be similarly modified, so that when the systems administrator checks the logs, everything looks normal despite the fact that the system has been compromised.
“在我们看来一切都运转得很正常,”州长的发言人Lucio Guerrero说,“我可不会为不和我们合作的民选官员说话。”
“From our side it’s proceeding as normal,” says Lucio Guerrero, his spokesman. “I can’t speak for the other elected officials who are choosing not to work with us.”
应用推荐