(no title)
nchase | 3 years ago
The steps include downloading a remote script, then entering the password of a privileged user.
Goodness, it would be a shame if someone were to change the contents of that remote script.
nchase | 3 years ago
The steps include downloading a remote script, then entering the password of a privileged user.
Goodness, it would be a shame if someone were to change the contents of that remote script.
No comments yet.