Linux wrote: > However, this should *never* be used alone for security concerns. A > compromiser can easily run that simple mount command to remount > read-write after root access.
I've been reading some of your recent comments, Anonymous looser, and I've really got to say this - you seem to make some authoritative style comments on things you really dont know much about. eg. in this case - the filesystem could be mounted readonly since its only exposed readonly from the underlying i/o or block subsystem. - KB -- Karanbir Singh : http://www.karan.org/ : [EMAIL PROTECTED] _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos