On Mon, 8 May 2000, Igmar Palsenberg wrote:
> You can always find out.. Logging is normally done through syslogd and
> klogd.. Try to hide those..
<ot>Use a rootkit. If they reappear, someone installed a rootkit.</ot>
> Some weird modification is useless with Open Source. Everybody can just
> read the code and write some nice detect app..
A thing that would be cool would be some mutually exclusive #ifdef'd code
segments selected at random at compile time. Noone knows which traps are
in the system... :-)
Simon
-- PGP public key available from http://phobos.fs.tum.de/pgp/Simon.Richter.asc Fingerprint: 10 62 F6 F5 C0 5D 9E D8 47 05 1B 8A 22 E5 4E C1 Hi! I'm a .signature virus! Copy me into your ~/.signature to help me spread!- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon May 15 2000 - 21:00:12 EST