On Tue, 22 Jan 2008, James Knott wrote:-

>David Bolt wrote:

>>  I'd apply the same logic to a Linux server as well. The reason being
>> that if a worm is able to install on the server using root privileges,
>> there's no way to know just what else has been installed by it without
>> performing some form of forensic work on the installation, and has to be
>> done using tools from outside the.
>
>Why would a server be running root privileges?

It wouldn't, but have you ever heard of local root exploits?


Regards,
        David Bolt

-- 
Team Acorn: http://www.distributed.net/ OGR-P2 @ ~100Mnodes RC5-72 @ ~15Mkeys
SUSE 10.1 32bit  | openSUSE 10.2 32bit | openSUSE 10.3 32bit | openSUSE 11.0a0
SUSE 10.1 64bit  | openSUSE 10.2 64bit | openSUSE 10.3 64bit
RISC OS 3.6      | TOS 4.02            | openSUSE 10.3 PPC   |RISC OS 3.11
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to