[EMAIL PROTECTED] wrote:
> 
> >>
> I can't address the rest but I do know some stuff about cracking *don't
> ask, and if you must ask do so pvtly*.  I know that the first utils a
> cracker will replace/redo/delete/alter are:
> 
> ps/ls/time/cp/rm
> 
> those are fairly standard, and yes generating phony logs isn't hard.
> Rootkits are widely available to do so with.  Need proof, I'll get you
> URLs pvtly.
> 
> If you want some decent info on this subject with a very legal bent, try
> www.sec33.com.
> --
> Femme
> >>
> 
> Add netstat to the short list of favorite utilities to change.
> I have also, unfortunately (!) gathered some first-hand info
> about the techniques used...  I will check my crucial binaries
> against the CD ones tonight, it maybe that the md5sums I have
> were done on already-compromised binaries...
> 
> Thanks for your time,
> 
> Serge Pineault
> 

*nods* Ty I did forget that one. I hope you haven't been hacked, and
doubt it highly in fact.

However in case you have been you have my sympathies & may wish to check
that site I mentioned as it has tons of info on security too.

-- 
Femme

Good Decisions You boss Made:

"We'll do as you suggest and go with Linux.  I've always liked that
character from Peanuts."

- Source: Dilbert


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to