Vladimir Stavrinov <vstavri...@gmail.com> writes: > First of all in most cases it is using on workstation where are no other > live users then You (or hacker breached into Your system) . Second, it > is used sporadically and rarely. To catch those passwords You need > continuously watching and analyze process list for a long time. It is > less likely for such scenario to be used. Some chance for using this > hole is on the servers where passwords are generated automatically and > very often.
Or a shared university shell server where you first advertise this tool to all students and members of the staff and then record all the passwords. -- To UNSUBSCRIBE, email to debian-mentors-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/84iphfogli....@sauna.l.org