top | item 37308558 (no title) gcoakes | 2 years ago What non-malicious use case is there for this? discuss order hn newest some_random|2 years ago Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder. eli|2 years ago presumably for checking compliance with a policy that forbids it
some_random|2 years ago Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder.
some_random|2 years ago
eli|2 years ago