Raj Kiran Grandhi writes: > There is an article on slashdot, > http://it.slashdot.org/article.pl?sid=07/10/05/1234217&from=rss which > says that most of the phishing sites are being run from rootkitted linux > boxes.
Probably not rooted. It is not necessary to root a machine running a Web server to put up unauthorized pages: you just need write access to the proper directories. This is usually accomplished via buggy php scripts, so your first step should be to quit using php. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]