Vladimir Stavrinov <[email protected]> writes: > First of all in most cases it is using on workstation where are no other > live users then You (or hacker breached into Your system) . Second, it > is used sporadically and rarely. To catch those passwords You need > continuously watching and analyze process list for a long time. It is > less likely for such scenario to be used. Some chance for using this > hole is on the servers where passwords are generated automatically and > very often.
Or a shared university shell server where you first advertise this tool to all students and members of the staff and then record all the passwords. -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

