TROJ_DDOS.ISR


 
Thread Tools Search this Thread
Special Forums Cybersecurity Malware Advisories (RSS) TROJ_DDOS.ISR
# 1  
Old 02-02-2011
TROJ_DDOS.ISR

Low

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

how to register ISR for PCI slot???

:wall::wall::wall:how to register ISR for PCI slot using callback registery (in c programing) i am using fedora 10 os.:wall::wall::wall::wall::wall: (0 Replies)
Discussion started by: powyama
0 Replies

2. Programming

How to register ISR for PCI slot???

how to register callback function in unix?? (0 Replies)
Discussion started by: powyama
0 Replies

3. UNIX for Dummies Questions & Answers

Linux Device Driver: how can an ISR wake up a user-thread?

Hi all, Is it possible to do the following in Linux (kernel 2.6.x): - A user-space thread goes to "sleep". Using any call/mechanism - On a hardware generated interrupt, the Interrupt handler (ISR) "wakes" the sleeping user-thread. I have seen wait_event() and wake_up() but it appears... (1 Reply)
Discussion started by: agaurav
1 Replies

4. UNIX for Advanced & Expert Users

wake up user space thread from kernel space ISR

Hello, I'm searching for a proper way to let the kernel space ISR(implemented in a kernel module) wake up a user space thread on a hardware interrupt. Except for sending a real-time signal, is it possible to use a semaphore? I've searched it on google, but it seems impossible to share a... (0 Replies)
Discussion started by: aaronwong
0 Replies
Login or Register to Ask a Question
SETEUID(2)						     Linux Programmer's Manual							SETEUID(2)

NAME
seteuid, setegid - set effective user or group ID SYNOPSIS
#include <sys/types.h> #include <unistd.h> int seteuid(uid_t euid); int setegid(gid_t egid); Feature Test Macro Requirements for glibc (see feature_test_macros(7)): seteuid(), setegid(): _BSD_SOURCE || _POSIX_C_SOURCE >= 200112L || _XOPEN_SOURCE >= 600 DESCRIPTION
seteuid() sets the effective user ID of the calling process. Unprivileged user processes may only set the effective user ID to the real user ID, the effective user ID or the saved set-user-ID. Precisely the same holds for setegid() with "group" instead of "user". RETURN VALUE
On success, zero is returned. On error, -1 is returned, and errno is set appropriately. ERRORS
EPERM The calling process is not privileged (Linux: does not have the CAP_SETUID capability in the case of seteuid(), or the CAP_SETGID capability in the case of setegid()) and euid (respectively, egid) is not the real user (group) ID, the effective user (group) ID, or the saved set-user-ID (saved set-group-ID). CONFORMING TO
4.3BSD, POSIX.1-2001. NOTES
Setting the effective user (group) ID to the saved set-user-ID (saved set-group-ID) is possible since Linux 1.1.37 (1.1.38). On an arbi- trary system one should check _POSIX_SAVED_IDS. Under libc4, libc5 and glibc 2.0 seteuid(euid) is equivalent to setreuid(-1, euid) and hence may change the saved set-user-ID. Under glibc 2.1 and later it is equivalent to setresuid(-1, euid, -1) and hence does not change the saved set-user-ID. Similar remarks hold for sete- gid(). According to POSIX.1, seteuid() (setegid()) need not permit euid (egid) to be the same value as the current effective user (group) ID, and some implementations do not permit this. SEE ALSO
geteuid(2), setresuid(2), setreuid(2), setuid(2), capabilities(7), credentials(7) COLOPHON
This page is part of release 3.27 of the Linux man-pages project. A description of the project, and information about reporting bugs, can be found at http://www.kernel.org/doc/man-pages/. Linux 2009-10-17 SETEUID(2)