Zapomenuté heslo nebo jméno
20. 9. 2010 14:41
„For instance, attackers can break into a system and exploit a hole in the web server to get complete root (also known as superuser) rights or permissions for a victim's system.“