>> I can't address the rest but I do know some stuff about cracking *don't ask, and if you must ask do so pvtly*. I know that the first utils a cracker will replace/redo/delete/alter are:
ps/ls/time/cp/rm those are fairly standard, and yes generating phony logs isn't hard. Rootkits are widely available to do so with. Need proof, I'll get you URLs pvtly. If you want some decent info on this subject with a very legal bent, try www.sec33.com. -- Femme >> Add netstat to the short list of favorite utilities to change. I have also, unfortunately (!) gathered some first-hand info about the techniques used... I will check my crucial binaries against the CD ones tonight, it maybe that the md5sums I have were done on already-compromised binaries... Thanks for your time, Serge Pineault
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com
