On Mon, 31 Jul 2000, Charles Galpin wrote:
--actually it's more about you being root, unintentionaly running someone
--else's script. In my example I should have pointed out that *anyone* could
--create an executeable file called /tmp/ls.
--
--charles
I don't know about anyone else, but I don't just go around and run people's
scripts. If I do happen to come along a script that I think about running, I
look at it for a long time first in an editor. I especially don't run things
that are in the /tmp directory.
jake
--On Mon, 31 Jul 2000, Jake McHenry wrote:
--
-->
--> ok, thanks for the info. I never really thought of it like that, someone else
--> running as root. Even though they would never get my password, I guess there are
--> other ways of becoming root. Thanks again.
-->
--> jake
-->
-->
--> On Mon, 31 Jul 2000, Charles Galpin wrote:
-->
--> --I didn't see anyone answer this, so I'll give it a stab.
--> --
--> --It protects you against trojans. The beauty of the unix security model is
--> --that a 'regular' user can't do much wrong to the system, only to
--> --themselves. However if you can get root to run something malicious (like
--> --"rm -rf /") then you can really cause some damage.
--
--
----
--To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
--as the Subject.
--
--
Jake McHenry
[EMAIL PROTECTED]
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.