Attack/Exploit Detection:

This example demonstrates detection of a previously unknown attack by looking for the side-effects left by an attacker. These side-effects are exaggerated when the system is Polymorphic, making the attacker a proverbial bull in a china shop.

Polymorphing for Linux Installation:

These examples demonstrate installation of Polymorphing for Linux in different containers, in only a few minutes with a single command.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.