On Tue, 22 Jan 2008, James Knott wrote:- >David Bolt wrote:
>> I'd apply the same logic to a Linux server as well. The reason being >> that if a worm is able to install on the server using root privileges, >> there's no way to know just what else has been installed by it without >> performing some form of forensic work on the installation, and has to be >> done using tools from outside the. > >Why would a server be running root privileges? It wouldn't, but have you ever heard of local root exploits? Regards, David Bolt -- Team Acorn: http://www.distributed.net/ OGR-P2 @ ~100Mnodes RC5-72 @ ~15Mkeys SUSE 10.1 32bit | openSUSE 10.2 32bit | openSUSE 10.3 32bit | openSUSE 11.0a0 SUSE 10.1 64bit | openSUSE 10.2 64bit | openSUSE 10.3 64bit RISC OS 3.6 | TOS 4.02 | openSUSE 10.3 PPC |RISC OS 3.11 -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]