also sprach Noah Meyerhans <[EMAIL PROTECTED]> [2006.01.04.1829 +0100]: > Yes, but we've already established through years of experience that, > once an attacker has root access, all bets are off.
Of course. It's not like the attacker couldn't just replace /sbin/init anyway. -- Please do not send copies of list mail to me; I read the list! .''`. martin f. krafft <[EMAIL PROTECTED]> : :' : proud Debian developer and author: http://debiansystem.info `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver! "writing a book is like washing an elephant: there no good place to begin or end, and it's hard to keep track of what you've already covered." -- anonymous
signature.asc
Description: Digital signature (GPG/PGP)