cas
Learning Storage Performance
The apparent lameness of Elbox notwithstanding, how is it a surprise that making random modifications to a third party binary, can be dangerous?
If the code in question, became dangerous only after it was modified by the cracker, this is the responsibility of people who use the crack (or the cracker himself). There is no limit to the amount of dangerous code that he might have injected.
Anytime you run a binary from an unknown source, you are putting yourself at risk.
If the code in question, became dangerous only after it was modified by the cracker, this is the responsibility of people who use the crack (or the cracker himself). There is no limit to the amount of dangerous code that he might have injected.
Anytime you run a binary from an unknown source, you are putting yourself at risk.