On 21-Dec-98 07:02:51, D. J. Bernstein wrote something about "Re: Frivolous forking".
I just couldn't help replying to it, thus:
> Russell Nelson writes:
> I never claimed that the costs of run-time configuration are impossibly
> high. I merely asked what the benefits are supposed to be.
The answers have long been archived in the mailing list archive. In a
couple of hundred copies, or so.
>> Hackers love your attitude, because they change ps, ls, and netstat to
>> hide.
login, telnetd, inetd, passwd, ...
> At that point you're already screwed. What are you trying to accomplish?
To be able to detect the intrusion (rpm -V is a Good Thing(tm)) and to
easily restore (from a known good copy, e.g. a CDROM) files that have been
tampered with.
> Annoy the intruder enough that he decides to remove all your files?
Definitely better than not knowing that your system has been cracked. You
have your daily backups to restore from.
Regards,
/������������������������������T�����������������������������������������\
| Rask Ingemann Lambertsen | [EMAIL PROTECTED] |
| Registered Phase5 developer | WWW: http://www.gbar.dtu.dk/~c948374/ |
| A4000, 775 kkeys/s (RC5-64) | "ThrustMe" on XPilot and EFnet IRC |
| Paperweights -- The only way to keep bills down. |