Description: Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
File list (Check if you may need any files):