Maven (famous)@lemmy.zip to Programmer Humor@programming.dev · 6 months agoCupholder.exelemmy.zipimagemessage-square124fedilinkarrow-up1971arrow-down116
arrow-up1955arrow-down1imageCupholder.exelemmy.zipMaven (famous)@lemmy.zip to Programmer Humor@programming.dev · 6 months agomessage-square124fedilink
minus-squareTrainguyrom@reddthat.comlinkfedilinkEnglisharrow-up5·6 months agoThere’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers
There’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers