Peter Schubert schreibt:

> *Neuinstallation* , offen gesagt, das klingt b�se ebenso wie das,
> was in dem Falle bei dem Microsoft-Schrott erforderlich ist.  Ist
> das nicht etwas �bertrieben...?

Nein.

,----[ http://www.cert.org/tech_tips/root_compromise.html#E.1 ]
| Keep in mind that if a machine is compromised, anything on that
| system could have been modified, including the kernel, binaries,
| datafiles, running processes, and memory. In general, the only way to
| trust that a machine is free from backdoors and intruder
| modifications is to reinstall the operating system from the
| distribution media and install all of the security patches before
| connecting back to the network.
`----

-- 
--Jhair

Public Key fingerprint:
81FF 3ADF BF6B CECB C593  4018 27AE D7D2 BAA6 00D0


--
Haeufig gestellte Fragen und Antworten (FAQ):
http://www.de.debian.org/debian-user-german-FAQ/

Zum AUSTRAGEN schicken Sie eine Mail an [EMAIL PROTECTED]
mit dem Subject "unsubscribe". Probleme? Mail an [EMAIL PROTECTED] (engl)

Antwort per Email an