How do rootkits get installed on your machine? For example. Would you have to have an Internet accessable webserver, or ssh server available?
Would it be by having a cavalier attitude about opening attachments on spam email, or perhaps accessing dodgy websites. I would have thought that you'd have to do something a bit foolish like running the machine as root for example, to risk the / filesystem being compromised, but I may well be wrong. Any pointers welcome. Nigel. ------------------------------------------------------------------------------ Create and Deploy Rich Internet Apps outside the browser with Adobe(R)AIR(TM) software. With Adobe AIR, Ajax developers can use existing skills and code to build responsive, highly engaging applications that combine the power of local resources and data with the reach of the web. Download the Adobe AIR SDK and Ajax docs to start building applications today-http://p.sf.net/sfu/adobe-com _______________________________________________ Rkhunter-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/rkhunter-users
