Depends... whether the resources will be exceeded has little to do with a live cd being used. It depends on how much resources the attacker needs (prob. not much), and how much is left when a live cd is running.
I doubt the resorces will be exceeded, and the system probably will still be usable for attacks.
|