Maven (famous)@lemmy.zip to Programmer Humor@programming.dev · 1 year agoCupholder.exelemmy.zipexternal-linkmessage-square129linkfedilinkarrow-up1994arrow-down118
arrow-up1976arrow-down1external-linkCupholder.exelemmy.zipMaven (famous)@lemmy.zip to Programmer Humor@programming.dev · 1 year agomessage-square129linkfedilink
minus-squareTrainguyrom@reddthat.comlinkfedilinkEnglisharrow-up5·1 year agoThere’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers
There’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers