On Thu, Oct 17, 2002 at 01:29:53PM -0700, Todd A. Jacobs wrote:
[...]
>     - Install portsentry.
>     - Configure tripwire and READ the reports.
>     - Install logsentry and READ the reports.
[...]

The one thing I don't understand here is: How can these tools help against a
dedicated cracker who will simply manipulate these tools once he has root
access to the machine?? As far as I can see, *anything* that's *on* the
machine itself is fair game once you have root access, is it not?

Cheerio,

Thomas
-- 
 http://www.netmeister.org/news/learn2quote.html
                                       ...'cause only lusers quote signatures!
     Thomas Ribbrock | http://www.ribbrock.org | ICQ#: 15839919
   "You have to live on the edge of reality - to make your dreams come true!"



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to