0patch consumes a negligible amount of CPU power. In contrast to many other security products that intercept potentially malicious data and have to compare it to a huge number of "signatures" to detect malware (often having to decompress file archives in the process), 0patch only executes a small amount of code to apply a micropatch in-memory to a running process - and it does that just once when a vulnerable module is loaded.
Have more questions? Submit a request
Please sign in to leave a comment.
0 Comments