Isn't that a catch 22, because now 'they' are already root and you've
already lost control of the system.

cheers,
sach


> als0 als0 wik:
> if the hash's are overwritten, it can result in a denial of service
> condition.  Again, checksum security is paramount.
>
> tack
>
> On Thu, 6 Sep 2001, Sach Jobb wrote:
>
> > > In the computer scheme, the analogue of the B cells would be some sort of
> > > daemon that constantly checks all files found on the system.  The MHA
> >
> > (snip, snip)
> >
> > This is a really interesting concept. It's actually quite similar to
> > secure bsd's hash key database for binaries. Where the binary won't
> > execute if it has been modify because the pair in the database doesn't
> > line up any more.
> >
> > Cheers,
> > sach
> >
> >
>
>

-- 

/*
  Sach Jobb
  [EMAIL PROTECTED]

  %s/windows/linux/g
*/

"As far as i'm concerned the two biggest hassles in the world revolve
around DNS and girlfriends."

-- (name undisclosed to protect the innocent)


Reply via email to