In fact, they're relatively inexpensive machines running on Linux operating systems.
Information is gathered by reading various files on a Linux system.
These functions provide interfaces to the respective Linux system calls.
The book gives readers instructions on how to build a Linux system from source.
It's actually fairly easy to put a rootkit on a Linux system, come to think of it.
Although not much is said about threats to the Linux system, they do exist and could increase in the future.
It can even be run on Linux systems through the Wine system.
The Linux system and the application software for the target device are both created on the development host.
The Linux system would not address the printer and was hung up for weeks there.
In Linux systems it forms part of the ipsec-tools package.