Content deleted Content added
mNo edit summary |
Wtmitchell (talk | contribs) m Reverted edits by Gingerzombie123 (talk) (HG) (3.4.4) |
||
Line 19:
In theory, a computer user has the ability to detect any such modifications, and the HIDS attempts to do just that and reports its findings.
Ideally a HIDS works in conjunction with a NIDS, such that a HIDS finds anything
Most successful intruders, on entering a target machine, immediately apply best-practice security techniques to secure the system which they have infiltrated, leaving only their own [[Backdoor (computing)|backdoor]] open, so that other intruders can not take over ''their'' computers.
|