On Thu, Mar 29, 2007 at 10:25:48AM +0300, Pablo Virolainen wrote: > Assuming you have break the system, and by breaking into the system, some > system binary has been changed. When they (the bad guys) get the > information (the hash value of the original binary) they can feed it back > so that AIDE won't see the change.
They can feed it back into where? And what keeps them from building the checksums of the original binary before exchanging it? Greetings Marc -- ----------------------------------------------------------------------------- Marc Haber | "I don't trust Computers. They | Mailadresse im Header Mannheim, Germany | lose things." Winona Ryder | Fon: *49 621 72739834 Nordisch by Nature | How to make an American Quilt | Fax: *49 621 72739835 _______________________________________________ Aide mailing list Aide@cs.tut.fi https://mailman.cs.tut.fi/mailman/listinfo/aide