> John Summerfield wrote:
>: Sounds good to me. A shell script would do fine - use the logger command to
>  report. 
>: Maybe sleep for a while to limit the rate of attempts.
>: 
>       No, shell is vulnerable to IFS and other environment attacks.
> Just a statically-linked ELF binary.
> 
> -Yenya
> 

Come on, explain to how this is so in the context of a login shell.

-- 
Cheers
John Summerfield
http://www2.ami.com.au/ for OS/2 & linux information.
Configuration, networking, combined IBM ftpsites index.

Microsoft's most solid OS: http://www.geocities.com/rcwoolley/

Note: mail delivered to me is deemed to be intended for me, for my disposition.





_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list

Reply via email to