Line 8:
Line 8:
* Apply "logrotate" on the fly
* Apply "logrotate" on the fly
* Garbage collector
* Garbage collector
+
* Catch SIGSEGV, do smth with mappings and act upon "illegal" memory access
Another is to do some activity on the victim and then just unload. With this we can
Another is to do some activity on the victim and then just unload. With this we can