Remote and local attacks
QNX SDP8.0User's GuideUser
We can break the broad division of security threats, also known as exploits, into categories:
- Remote exploit
 - The attacker connects to the machine via the network and takes advantage of bugs or weaknesses in the system.
 - Local attack
 - The attacker has an account on the system in question and can use that account to attempt unauthorized tasks.
 
Page updated: 
