|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Friday, 29 October 1999||Author: Quentin Cregan|
|Published to: news_enhance_security/Security News||Page: 1/1 - [Printable]|
If they break in, what can they do?
If you're broken into, we all understand that any files may be edited, root kits may be installed and the like... but what about the kernel being edited live ?