Isn't that a catch 22, because now 'they' are already root and you've
already lost control of the system.
cheers,
sach
> als0 als0 wik:
> if the hash's are overwritten, it can result in a denial of service
> condition. Again, checksum security is paramount.
>
> tack
>
> On Thu, 6 Sep 2001, Sach Jobb wrote:
>
> > > In the computer scheme, the analogue of the B cells would be some sort of
> > > daemon that constantly checks all files found on the system. The MHA
> >
> > (snip, snip)
> >
> > This is a really interesting concept. It's actually quite similar to
> > secure bsd's hash key database for binaries. Where the binary won't
> > execute if it has been modify because the pair in the database doesn't
> > line up any more.
> >
> > Cheers,
> > sach
> >
> >
>
>
--
/*
Sach Jobb
[EMAIL PROTECTED]
%s/windows/linux/g
*/
"As far as i'm concerned the two biggest hassles in the world revolve
around DNS and girlfriends."
-- (name undisclosed to protect the innocent)