Folks,
I've a EP Security module, its embedded inside an app for provisioning and other entitlements.
The binary inside ~/Content/MacOS is launched using launchctl and *.plist.
Being a root enabled ( and debug disabled ) process, How can we instrument and analyze the performance such a daemon?
TIA,
prokash
I've a EP Security module, its embedded inside an app for provisioning and other entitlements.
The binary inside ~/Content/MacOS is launched using launchctl and *.plist.
Being a root enabled ( and debug disabled ) process, How can we instrument and analyze the performance such a daemon?
TIA,
prokash