On Thu, Nov 09, 2000 at 09:46:08AM -0600, Bill Carlson wrote:
[...]
> So, is there a consensus, should rpm -Va be trusted after a successful
> attack?

I'd say, the easiest way to accomplish that would be to take a copy of
the RPM database (onto an external medium, e.g. floppy) each time you
change something.
Other than that my guess would be that if up to now noone has yet
changed that database, it's probably only a matter of time until they
start doing so... (Hm, wouldn't it suffice to simply delete the database
to foil using rpm -Va?)

My EUR0.02,

Thomas
-- 
             "Look, Ma, no obsolete quotes and plain text only!"

     Thomas Ribbrock | http://www.bigfoot.com/~kaytan | ICQ#: 15839919
   "You have to live on the edge of reality - to make your dreams come true!"



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to