begin quoting Rachel Garrett as of Wed, Apr 20, 2005 at 01:20:59PM -0700: [snip] > I must have switched thoughts mid-sentence or something. Should read:
I got the gist. > If all that's been compromised is a user account, then the attacker > can't hide certain things that the user would otherwise notice. > [Followed by example of last login; there's no way for a *user* to > change their own last-login time, is there?] That's assuming a guessed password attack. And how often do people keep close track of when they last logged in? On important machines, you keep a book, and you compare the book to what the computer says. But that's far too much trouble for the average user. -Stewart "I guess we should talk about the intrusion vectors too" Stremler
pgpK4n2YCpeV0.pgp
Description: PGP signature
-- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
