Example: stock market
Observing Linux Behavior
Found 2 free book(s)Observing Linux Behavior - Winthrop University
faculty.winthrop.eduObserving Linux Behavior CSCI411 Lab Adapted from Linux Kernel Projects by Gary Nutt Exercise Goal: You will learn several important characteristics of the Linux kernel, processes, memory and other resources. You will write a program to use the /proc virtual file system to inspect various kernel values that reflect the machines load average, process resource utilization and so on.
Practical Malware Analysis - Black Hat | Home
www.blackhat.com•The attacker might change his behavior •By allowing malware to connect to a controlling server, you may be entering a real-time battle with an actual human for control of your analysis (virtual) machine •Your IP might become the target for additional attacks (consider using TOR) •You may end up attacking other people