PPT Slide
Process Hijacking is also convenient:
- the hijacker injects the system call and checkpoint
- the hijacker replaces the original system calls
Any process can be hijacked at any time
- No special preparation of the process
Condor jobs no longer need to be re-linked