Hacker News new | past | comments | ask | show | jobs | submit login

That's not exactly the same, because it's essentially modifying the operating system files to bypass the security checks, whereas this article and the gif are basically loopholes in the OS that gives you access.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: