On Wednesday 2007-08-22 11:16, Joachim Schrod wrote: > Sloan wrote: > > It seems to be essentially one of the "honor system" viruses for unix, > > you know the drill: > > > > 1. download the hostile executable > > 2. save the save the hostile executable somewhere appropriate > > 3. change the file mode to make it executable. > > 4. execute it with the command ./<filename> > > 5. hilarity ensues (or not) > > Let me propose another hilarious 5-step process:
Allow me to propose a one step process: 1) You explain why every linux/unix/*ix box on the planet is not owned by hackers and spammers while so many possible exploits exist. -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]