You can dump Linux or Unix server memory. This is useful for forensics analysis, and testing your own system. This is often desirable to see:
- What code and what data actually resides in memory.
- You can search for specific pids memory.
- Search memory for string and other data such as passwords.
- Works as add-on tool for gdb and others.
- Search/replace/dump memory from running processes and core files.
- All kinds of deep hacking activities that simply saves your time and solve problems.
Process identifier (PID) is a number used by Linux / Unix kernels (and Windows operating systems) to identify a process. Usually, new processes are created using the fork() system call. Each PID (or so called tasks) can be monitored under Linux. In this quick tutorial, I will explain how to use the pidstat command for monitoring individual tasks currently being managed by the Linux kernel.
The Linux kernel version 3.5 has been released and is now available for download. New features include support for hybrid graphics, security fixes, and other enhancements.