Make Your Own Read-Only Device with NetBSD
(dragas.net)
One detail that is often overlooked when dealing with embedded (or remote) devices is a key point of vulnerability: the file system.
One detail that is often overlooked when dealing with embedded (or remote) devices is a key point of vulnerability: the file system.