GENERAL WARNING
Cliff Stanford
demon at ibmpcug.co.uk
Thu Sep 27 09:42:14 AEST 1990
cedman at lynx.ps.uci.edu (Carl Edman) writes:
> Now, really: It is very easy to change particularily a programm like
> a shell to f.e. put the name of a non-backtraceable account into the
> .rhosts file and then send mail to it to inform the hacker that
> he has just gotten a new account. Maybe even a su account ?
You mean that if that were included in the source to a
large program (ELM, for instance) you'd notice it was there
before compiling it? I doubt I would.
Regards,
Cliff.
--
Automatic Disclaimer:
The views expressed above are those of the author alone and may not
represent the views of the IBM PC User Group.
--
Cliff Stanford cms at demon.co.uk
Demon Systems Limited demon at ibmpcug.co.uk
42 Hendon Lane demon at cix.co.uk
London N3 1TT - England +44 81 349 0063
More information about the Alt.sources
mailing list