On Sun, 22 Jul 2001 03:56:26 +0200 (SAST)
The Psychotic Viper <[EMAIL PROTECTED]> wrote:
TV> Sure it takes time to to backup user data, reinstall of multiple machines
TV> but it may save a lot of time when you have to keep rebuilding your
TV> machine because your visitor keeps getting back in. A
And you need to be sure that you really _are_ booting off the CD, not
booting a hacked kernel from the hard disk which detects that you have
a bootable CD in the drive and assumes that you're trying to boot off
CD to clean up your system, so _pretends_ to be booting off the CD
except when you come
Mike Hoskins wrote:
>
> On Fri, 20 Jul 2001, Tom wrote:
>
> > But if a backdoor is installed, you can't trust cvsup, or make either.
> > Any binary could have been tampered with. For instance, I would make a
> > backdoor make that would detect that an installworld is underway, and
> > always
On Fri, 20 Jul 2001 [EMAIL PROTECTED] wrote:
> Probably just warning. I personally couldn't believe it, but on
> the last list of my 4.2-RELEASE appeared that host sh2.1-sh.com was logged
> as user Jim. The one bad thing I did, that firewall wasnt working and
> there is NFS available ...
I
On Fri, 20 Jul 2001 [EMAIL PROTECTED] wrote:
> Probably just warning. I personally couldn't believe it, but on
> the last list of my 4.2-RELEASE appeared that host sh2.1-sh.com was logged
> as user Jim. The one bad thing I did, that firewall wasnt working and
> there is NFS available (besi
Hallo there,
Probably just warning. I personally couldn't believe it, but on
the last list of my 4.2-RELEASE appeared that host sh2.1-sh.com was logged
as user Jim. The one bad thing I did, that firewall wasnt working and
there is NFS available (besides BRIGDED connection to CISCO Router,