On 12/14/05, Ravi Kumar <[EMAIL PROTECTED]> wrote: > That conversation set me wondering ... How immune is a linux system > from someone hacking the system and including a key logging utility > with out the users knowledge. I know that certain distributions have > all the ports closed by default. Does having all ports closed alone > circumvent this problem? And what precautions should be taken for the > same. I am talking w.r.t a home user running linux. A home user is > vulnerable because nowadays with broadband, his computer is always > connected to the internet.
Extremely paranoid usesr can make their own live distro and boot off it to browse the internet. That said unless some one is either able to install rootkit or login to users account the keyloggers can not run. Guru's out there can flame me if I am wrong in this assumption. -- Sudev Barar Learning Linux ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_idv37&alloc_id865&op=click _______________________________________________ linux-india-help mailing list linux-india-help@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-india-help