On Sun, Jul 06, 2003 at 01:00:13PM -0500, Jos� Guzm�n wrote:
>   This practice, at least over here, aids in improving sysadmin sleep at 
> night.

this is a very false asumption. If somebody is able to trojan your kernel
with a loadable module, he is also able to simply install a new kernel with
a trojan in it.

Dont bet your sleep on it.

Greetings
Bernd
-- 
  (OO)      -- [EMAIL PROTECTED] --
 ( .. )  [EMAIL PROTECTED],linux.de,debian.org} http://home.pages.de/~eckes/
  o--o     *plush*  2048/93600EFD  [EMAIL PROTECTED]  +497257930613  BE5-RIPE
(O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!


Reply via email to