On 12/14/05, Ravi Kumar <[EMAIL PROTECTED]> wrote:
> That conversation set me wondering ... How immune is a linux system
> from someone hacking the system and including a key logging utility
> with out the users knowledge. I know that certain distributions have
> all the ports closed by default. Does having all ports closed alone
> circumvent this problem? And what precautions should be taken for the
> same. I am talking w.r.t  a home user running linux. A home user is
> vulnerable because nowadays with broadband, his computer is always
> connected to the internet.

Extremely paranoid usesr can make their own live distro and boot off
it to browse the internet.

That said unless some one is either able to install rootkit or login
to users account the keyloggers can not run. Guru's out there can
flame me if I am wrong in this assumption.
--
Sudev Barar
Learning Linux


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_idv37&alloc_id865&op=click
_______________________________________________
linux-india-help mailing list
linux-india-help@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to