* This one time, at band camp, Andy Eager said:
> Jamie Wilkinson wrote:
> 
> > This one time, at band camp, Andy Eager said:
> > 
> >>   a)   Periodically, examine all running tasks.
> >>   b)   For each task, do an 'rpm --verify' for the package that this 
> >> process belongs to.
> > 
> > 
> > How about a virus that renames itself to 'ls', you check the process list
> > and verify that ls is in the package database.
> > 
> If a virus did copy something over ls, it would be caught as follows:
> 
>    rpm -qif `which ls`     would return the package name fileutils
>    rpm --verify fileutils  would show that ls had been modified.
> 
And if it were rpm that got trojaned?

-- 
Greeno <[EMAIL PROTECTED]>
GnuPG Key :  1024D/B5657C8B 
Key fingerprint = 9ED8 59CC C161 B857 462E  51E6 7DFB 465B B565 7C8B

Imagine working in a secure environment and finding the string 
_NSAKEY in the OS binaries without a good explanation
    -Alan Cox 04/05/2001

PGP signature

Reply via email to