On Thursday 18 July 2002 15:08, Brad Felmey wrote:
> Since you have to be root in the first place to modify sshd_config, to
> useradd, to vi shadow, then you're already root, and why would it be
> necessary to deliberately then make a remote hole? The only use I could
> see is a scripted trojan or worm.

maybe he wants to have some account with empty password, but not let someone 
use them remotely via ssh.


Reply via email to