> John Summerfield wrote:
>: Sounds good to me. A shell script would do fine - use the logger command to
> report.
>: Maybe sleep for a while to limit the rate of attempts.
>:
> No, shell is vulnerable to IFS and other environment attacks.
> Just a statically-linked ELF binary.
>
> -Yenya
>
Come on, explain to how this is so in the context of a login shell.
--
Cheers
John Summerfield
http://www2.ami.com.au/ for OS/2 & linux information.
Configuration, networking, combined IBM ftpsites index.
Microsoft's most solid OS: http://www.geocities.com/rcwoolley/
Note: mail delivered to me is deemed to be intended for me, for my disposition.
_______________________________________________
Redhat-devel-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-devel-list