Ralf Mardorf writes: > On Mon, 2013-12-09 at 18:13 +0100, Gian Uberto Lauri wrote: > > Think about this scenario: someone devises a clever way to slip a > > Trojan in a user account. > > Than the trojan has got user privileges only. If it's a key logger it > can read what password you type for sudo, but also what you type for su.
What I fear is a fiendish tool that hijacks your bash stdin and stdout and injects sudo commands. Not a keylogger, some stealty bastard that stays hidden, hits, and returns hidden. > I know they hack servers, but was the Linux home PC of anybody on this > list ever hacked? How could you detect? Are you sure you have the skills to detect this? Do you feel safe because you are on a dynamically assigned IP? Linux home PC are not yet a direct target because the user base of Linux desktop users. Give them a good reason to write a stuxnet for GNU/Linux and they will write a stuxnet for GNU/Linux. -- /\ ___ Ubuntu: ancient /___/\_|_|\_|__|___Gian Uberto Lauri_____ African word //--\| | \| | Integralista GNUslamico meaning "I can \/ coltivatore diretto di software not install giĆ sistemista a tempo (altrui) perso... Debian" Warning: gnome-config-daemon considered more dangerous than GOTO -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/21158.50965.22307.269...@mail.eng.it