Stewart Stremler wrote:
begin quoting JD Runyan as of Tue, Apr 19, 2005 at 09:39:35AM -0500:
2) root can read and write everything. root is the only user that can do
this. If root is the only user, then attacks have access to everything
And? Why is this a concern?
-Stewart "It's all about the data. Everything else is replaceable." Stremler
Yes, but (as a single user) "replaceable" takes time. And what takes
the most time is remembering all the downloads and installs and how to
do them. This is one "single user" who cares about the time it will
take me to recover my environment. I don't like how much I su to root,
but I'm still learning and don't yet know a better way. I want to
reduce my risk, and do so when I learn how. (For this reason, I just
love these kinds of discussions for the tidbits that pop out, like
"using SSH will give you thus-and-such" countered by "not unless you do
this-and-that to the ports permissions" or the like. Sometimes, it gets
spelled out enough for me to actually figure out.)
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list