2050 shaares
148 private links
148 private links
"""
RedStar “is highly customized,” Schiess said. “They've also added a lot of features to improve the security of the system.”
Those include a pre-installed firewall, extra protections of some of the system's core files, and a small program which constantly crawls the computer to check for any changes made to those files.
This program calls up a list of MD5 hashes—basically cryptographic fingerprints of files—and “as soon as this daemon sees that one of these files has been changed, it immediately reboots the system.
"""