Slide 8
Slide 8 text
Let's do this
Legacy code, no easy injection method without
disruptive changes
The most surefire way of testing this is by
changing our PC's clock
A little clumsy
This leads to nasty problems on reboot
Enter: A third party tool, which intercepts calls to
Linux's c
l
o
c
k
_
g
e
t
t
i
m
e