Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Very simple. From a state level, if they are trying to compromise a system, get persistent access, already have access, but need to escalate, then atop is a solution if it's already on the system.

Just like Notepad++ back in the day.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: