>>"Mukund" == Mukund Deshmukh <[EMAIL PROTECTED]> writes:

 Mukund> The real hacker try to get an account the server by
 Mukund> exploiting various software which have bugs. Then make a back
 Mukund> door entry on the server from where he can again come back.
 Mukund> Clean the system logs to hide their presence, and enjoy.

        I would question the ethics of this. A rule of thumb I use:
 Hacking is not something you have to be ashamed of, and not something
 you have to hide. If you do not have ths sysadmins permission to do
 something, DONT do it. 

        manoj
-- 
 I once witnessed a long-winded, month-long flamewar over the use of
 mice vs. trackballs... It was very silly. Matt Welsh
Manoj Srivastava   <[EMAIL PROTECTED]>  <http://www.debian.org/%7Esrivasta/>
1024R/C7261095 print CB D9 F4 12 68 07 E4 05  CC 2D 27 12 1D F5 E8 6E
1024D/BF24424C print 4966 F272 D093 B493 410B  924B 21BA DABB BF24 424C

-----------------------------------------------------------------------
The LIH mailing list archives are available at:
http://lists.linux-india.org/cgi-bin/wilma/linux-india-help

Reply via email to