Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

System log files have the potential to contain all kinds of sensitive data from all users of the system. Your own processes only have access to your own data.


> Your own processes only have access to your own data

You meant your hacker's processes ...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: