This is new to me. And sounds interesting. Any pointers to get more
to read on this? Can anyone summarize what it means and how does it
work?
I have been able to hakc rootshell of some Linux machines using
overflows etc.. is this thing same as a virus?
--------------------------------------------------------------------
The Linux India Mailing List Archives are now available. Please search
the archive at http://lists.linux-india.org/ before posting your question
to avoid repetition and save bandwidth.