Hi, Check out the following link regarding Back Orifice. <A HREF="http://www.wired.com/news/news/technology/story/16310.html"><A HREF="http://www.wired.com/news/news/technology/story/16310.html</A">http://www.wired.com/news/news/technology/story/16310.html</A</A>> It talks about the complete lack of security in the windows operating system. My question is: Are these types of attacks possible against Linux systems? Is it possible to inadvertently install a trojan, by installing an RPM as root ? Is it possible to have a process running under Linux that dosn't show up with a ps -aux? Or show up as a seemingly safe process, only to be hiding a secret trojan? Would the tripwire package detect an attempt to alter some linux executable? What I'm thinking is that during an install of some package, as root, a binary edit might be done on an existing executable. Do you need to do regular checksums of all your executables to see if they've been changed? Am I paranoid, or should we start worrying about this? - To get out of this list, please send email to majordomo@suse.com with this text in its body: unsubscribe suse-linux-e