I suppose that if someone managed to get into a machine, he could simply
regenerate the md5 checksums after modifying "ls, ps, top and friends".

Just another question: could anyone suggest a way to automate checks
with debsums? And why shoul I use debsums instead of simply running
stuff like tiger or integrit? I don't get it.

Wish everyone a good day.

--
Kristian




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to