LMS runs as a normal program - Perl is an interpreted language which means code can be changed dynamically so very hard to protect once accessed.
As Paul has mentioned custom plugins are one way but there are many other ways (e.g. "play" an OPML URL with a custom parser) depending on the skill of the hacker) . Many methods can be used to "infect" the LMS host system and then use it as a backdoor to access any system on your network which can then be modified/destroyed, monitor personal use or even use your systems to host spam/malware from your network. ------------------------------------------------------------------------ bpa's Profile: http://forums.slimdevices.com/member.php?userid=1806 View this thread: http://forums.slimdevices.com/showthread.php?t=111445 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/mailman/listinfo/discuss
