Omer Zak <[EMAIL PROTECTED]> wrote:
> 
> The advantage is that even if the root is compromised, the cracker's
> ability to inflict actual damage will be limited.
 
I may be missing something here, but once an attacker have root access
to your firewall, what prevents her from modifying routing tables and even
more, changing the security policy to allow her access from any machine.
This does not require any disk space you know ...

Guy


Omer: sorry for the double post i mistakly sent to you any not the list.

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

  • A ... Omer Zak
    • ... Ariel Biener
      • ... Omer Zak
        • ... Ariel Biener
    • ... Aviram Jenik
      • ... Ariel Biener
    • ... Guy Cohen
    • ... Gilad Ben-Yossef
      • ... Alex Shnitman
        • ... Gilad Ben-Yossef
      • ... Ilya Konstantinov
        • ... Moshe Zadka
        • ... Gilad Ben-Yossef
          • ... Aviram Jenik
            • ... Gilad Ben-Yossef
    • ... פופוב יבגני
      • ... Gilad Ben-Yossef

Reply via email to