* Stephen Kuhn > On Fri, 2003-03-07 at 14:22, KC wrote: > > what exactly is a "chroot" > > > > CHANGE ROOT (for mounting a different point as your root)
Well, it does not explain its purpose which is to encertain that a user, say a remote ftp user, does not fiddle around your file system, but is constrained (enclosed, confined, imprisoned) to the file tree segment that has the given directory as top node. Works well I think, but I do not know if there are any known vulnerabilities. -- Jon Haugsand, [EMAIL PROTECTED] http://www.norges-bank.no -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list