Linux wrote:
> However, this should *never* be used alone for security concerns. A
> compromiser can easily run that simple mount command to remount
> read-write after root access. 

I've been reading some of your recent comments, Anonymous looser, and
I've really got to say this - you seem to make some authoritative style
comments on things you really dont know much about. eg. in this case -
the filesystem could be mounted readonly since its only exposed readonly
from the underlying i/o or block subsystem.

- KB
-- 
Karanbir Singh : http://www.karan.org/ : [EMAIL PROTECTED]
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to