Vladimir Stavrinov <vstavri...@gmail.com> writes:
> First of all in most cases it is using on workstation where are no other
> live users then You (or hacker breached into Your system) . Second, it
> is used sporadically and rarely. To catch those passwords You need
> continuously watching and analyze process list for a long time. It is
> less likely for such scenario to be used. Some chance for using this
> hole is on the servers where passwords are generated automatically and
> very often.

Or a shared university shell server where you first advertise this tool
to all students and members of the staff and then record all the
passwords.


-- 
To UNSUBSCRIBE, email to debian-mentors-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/84iphfogli....@sauna.l.org

Reply via email to