Originally Published: Friday, 29 October 1999 Author: Quentin Cregan
Published to: news_enhance_security/Security News Page: 1/1 - [Printable]

If they break in, what can they do?

If you're broken into, we all understand that any files may be edited, root kits may be installed and the like... but what about the kernel being edited live ?