Changes

Jump to navigation Jump to search
76 bytes added ,  14:46, 9 February 2016
no edit summary
Line 8: Line 8:  
* Apply "logrotate" on the fly
 
* Apply "logrotate" on the fly
 
* Garbage collector
 
* Garbage collector
 +
* Catch SIGSEGV, do smth with mappings and act upon "illegal" memory access
    
Another is to do some activity on the victim and then just unload. With this we can
 
Another is to do some activity on the victim and then just unload. With this we can

Navigation menu