top | item 37308558

(no title)

gcoakes | 2 years ago

What non-malicious use case is there for this?

discuss

order

some_random|2 years ago

Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder.

eli|2 years ago

presumably for checking compliance with a policy that forbids it