Readme updates pending...

This commit is contained in:
Christopher Laprise 2018-03-29 09:53:07 -04:00
parent d0c2519a2a
commit 05f4e30a22
No known key found for this signature in database
GPG key ID: 448568C8B281C952

View file

@ -58,8 +58,6 @@ The `vm-boot-protect` concept relies mostly on the guest operating system's own
Repeated running of some apps such as Firefox, Chrome, LibreOffice, PDF viewers, online games, etc. may allow malware to persist in a VM; this is not only because of the complexity of the formats handled by such apps, but also because of settings contained in javascript or which specify shell commands to be executed by the app.
Further, if the user configures a vulnerable app to run at startup, this introduces a malware persistence risk -- although not to the VM's whole execution environment if no privilege escalation is available to the attacker.
### Notes
* The service name has been changed from `vm-sudo-protect` in pre-release to `vm-boot-protect`. The install script will automatically try to disable the old service.