On Sun, Jul 06, 2003 at 01:00:13PM -0500, Jos� Guzm�n wrote: > This practice, at least over here, aids in improving sysadmin sleep at > night.
this is a very false asumption. If somebody is able to trojan your kernel with a loadable module, he is also able to simply install a new kernel with a trojan in it. Dont bet your sleep on it. Greetings Bernd -- (OO) -- [EMAIL PROTECTED] -- ( .. ) [EMAIL PROTECTED],linux.de,debian.org} http://home.pages.de/~eckes/ o--o *plush* 2048/93600EFD [EMAIL PROTECTED] +497257930613 BE5-RIPE (O____O) When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!

