begin  quoting Rachel Garrett as of Wed, Apr 20, 2005 at 01:20:59PM -0700:
[snip]
> I must have switched thoughts mid-sentence or something. Should read:

I got the gist.

> If all that's been compromised is a user account, then the attacker
> can't hide certain things that the user would otherwise notice.
> [Followed by example of last login; there's no way for a *user* to
> change their own last-login time, is there?]

That's assuming a guessed password attack. And how often do people keep
close track of when they last logged in?

On important machines, you keep a book, and you compare the book to 
what the computer says.  But that's far too much trouble for the average
user.

-Stewart "I guess we should talk about the intrusion vectors too" Stremler

Attachment: pgpK4n2YCpeV0.pgp
Description: PGP signature

-- 
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to