On Sun, Jul 13, 2008 at 5:01 PM, Carlos E. R.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
The Sunday 2008-07-13 at 16:48 -0700, John Andersen wrote:
On Sun, Jul 13, 2008 at 10:27 AM, Lars Marowsky-Bree
wrote: It's true that a traditional system setup has difficulty in spreading viruses, but against trojans the system is just as vulnerable; and local root exploits are not that rare, either.
Why do you say the system is just as vulnerable against/to trojans
Trojans usually involve a replacement module for a system module. To get a trojan to work on linux, you have to: 1) Convince someone to download it,
Just create an interesting repository in the build service and pervert it.
Or hack pervert an existing repo.
Or pervert the source code of some project, it might take some time till discovered.
Of these the last seems possible. Especially if the project is in disarray, and check ins are not carefully watched. But Repos usually are signed, and in addition to the above you have to convince the masses that the key should be imported and trusted. -- ----------JSA--------- Sig line deleted for the humor impaired. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org