On Wednesday 2007-08-22 11:16, Joachim Schrod wrote:
> Sloan wrote:
> > It seems to be essentially one of the "honor system" viruses for unix,
> > you know the drill:
> >
> > 1. download the hostile executable
> > 2. save the save the hostile executable somewhere appropriate
> > 3. change the file mode to make it executable.
> > 4. execute it with the command ./<filename>
> > 5. hilarity ensues (or not)
>
> Let me propose another hilarious 5-step process:

Allow me to propose a one step process:

1) You explain why every linux/unix/*ix box on the planet is not owned by 
hackers and spammers while so many possible exploits exist.
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to