On Thu, Oct 17, 2002 at 01:29:53PM -0700, Todd A. Jacobs wrote: [...] > - Install portsentry. > - Configure tripwire and READ the reports. > - Install logsentry and READ the reports. [...]
The one thing I don't understand here is: How can these tools help against a dedicated cracker who will simply manipulate these tools once he has root access to the machine?? As far as I can see, *anything* that's *on* the machine itself is fair game once you have root access, is it not? Cheerio, Thomas -- http://www.netmeister.org/news/learn2quote.html ...'cause only lusers quote signatures! Thomas Ribbrock | http://www.ribbrock.org | ICQ#: 15839919 "You have to live on the edge of reality - to make your dreams come true!" -- redhat-list mailing list unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list