On Mon, 2004-12-27 at 00:54 -0800, saravanan ganapathy wrote:
> Refer the url for more details
> http://linux.math.tifr.res.in/doc/securing-debian-howto/ch3.en.html
> 

I saw compromised systems where attacker had installed Perl.

Besides, for most of the architectures, executables (as deb packages)
are easily available on the web anyway.

-ali


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to