LMS runs as a normal program - Perl is an interpreted language which
means code can be changed dynamically so very hard to protect once
accessed. 

As Paul has mentioned custom plugins are one way but there are many
other ways (e.g. "play" an OPML URL with a custom parser) depending on
the skill of the hacker) .  

Many methods can be used to "infect" the LMS host system and then use it
as a backdoor to access any system on your network which can then be
modified/destroyed, monitor personal use or even use your systems to
host spam/malware from your network.


------------------------------------------------------------------------
bpa's Profile: http://forums.slimdevices.com/member.php?userid=1806
View this thread: http://forums.slimdevices.com/showthread.php?t=111445

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/mailman/listinfo/discuss

Reply via email to