GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Tuesday, 08-Oct-2024 01:49:18 JST翠星石翠星石
    • Abhiseck Paira :gnu:
    • The Cobra
    @redstarfish @cobra Depending on the kind of rootkit infestation, if you are using a proprietary OS vulnerable to rootkits, removing the HDD, putting in a new one and reinstalling will likely end in a rootkit installation again.

    Some rootkits embed themselves into the BIOS or UEFI image and then re-infect a reinstalled OS (UEFI actually made security worse, as with BIOS's, such rootkits needed to be tailored per-computer or at least per-vendor, while with UEFI, you can make a single exploit jpeg with a rootkit inside that will hijack most UEFI implementations, even across architectures).
    In conversationabout 9 months ago from freesoftwareextremist.compermalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.