On Mon, 2013-12-09 at 18:13 +0100, Gian Uberto Lauri wrote:
> Think about this scenario: someone devises a clever way to slip a
> Trojan in a user account.

Than the trojan has got user privileges only. If it's a key logger it
can read what password you type for sudo, but also what you type for su.

User 1000 who has got cow powers when using sudo, does not have the cow
powers without running sudo.

It doesn't matter if you set-up and use sudo, su or sudo and su.
Security is a combination of actions to be taken.

I know they hack servers, but was the Linux home PC of anybody on this
list ever hacked?



-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1386610474.14806.166.camel@archlinux

Reply via email to