Hi I read about the irssi problem.
One thing I don't understand: >From the irssi website: "...but possibly it ran a rootkit or whatever and you'll need to reinstall your whole system." The backdoor is in the configure script. How can a rootkit be installed on the machine ? ./configure is not executed by root (if the user does it right). Does make install also use the script ? If the atacker has normal user access than this is bad, but not a real problem. thanks have fun Felix