How do rootkits get installed on your machine?

For example. Would you have to have an Internet accessable webserver, or ssh 
server available?

Would it be by having a cavalier attitude about opening attachments on spam 
email, or perhaps accessing dodgy websites.

I would have thought that you'd have to do something a bit foolish like 
running the machine as root for example, to risk the / filesystem being 
compromised, but I may well be wrong.

Any pointers welcome.

Nigel.


------------------------------------------------------------------------------
Create and Deploy Rich Internet Apps outside the browser with Adobe(R)AIR(TM)
software. With Adobe AIR, Ajax developers can use existing skills and code to
build responsive, highly engaging applications that combine the power of local
resources and data with the reach of the web. Download the Adobe AIR SDK and
Ajax docs to start building applications today-http://p.sf.net/sfu/adobe-com
_______________________________________________
Rkhunter-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to