← Back to context Comment by gcoakes 2 years ago What non-malicious use case is there for this? 2 comments gcoakes Reply some_random 2 years ago Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder. eli 2 years ago presumably for checking compliance with a policy that forbids it
some_random 2 years ago Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder.
Network monitoring for unauthorized/unusual access, reading more into how this works I don't think this would actually change anything, you can probably still discern scripted vs manual shells it would just be a bit harder.
presumably for checking compliance with a policy that forbids it