This is new to me. And sounds interesting. Any pointers to get more
to read on this? Can anyone summarize what it means and how does it
work?

I have been able to hakc rootshell of some Linux machines using
overflows etc.. is this thing same as a virus?


--------------------------------------------------------------------
The Linux India Mailing List Archives are now available.  Please search
the archive at http://lists.linux-india.org/ before posting your question
to avoid repetition and save bandwidth.

Reply via email to