Skip to main content
5 events
when toggle format what by license comment
Jul 4, 2022 at 19:30 review Close votes
Jul 21, 2022 at 3:03
Jul 4, 2022 at 19:13 comment added multithr3at3d Interesting idea to prevent persistence. But you introduce some other possible attack vectors. You'd have to be very careful to verify the integrity of the remote image and ensure it wasn't modified.
Jul 3, 2022 at 11:24 answer added Artem S. Tashkinov timeline score: 1
Jul 2, 2022 at 14:46 comment added mti2935 Excellent question. +1. The terms you might want to search for are PXE and iPXE. See ipxe.org for some interesting reading on this subject. networkboot.org and netboot.xyz are also informative.
Jul 2, 2022 at 14:22 history asked Christian CC BY-SA 4.0