On Sat, Dec 09, 2006 at 03:15:09PM +0100, Roger Grosswiler wrote: > i just asked myself, why a normal user shouldn't be able to run pup by > itself without root permission. I can see the malicious atack now: a web page or HTML email that downloads and installs malware from the user's account and installs it such that all users are affected, not just the victim. I expect that others can come up with even nastier scenarios. Remember that making live easier for the user also makes life easier for the attacker. -- Charles Curley /"\ ASCII Ribbon Campaign Looking for fine software \ / Respect for open standards and/or writing? X No HTML/RTF in email http://www.charlescurley.com / \ No M$ Word docs in email Key fingerprint = CE5C 6645 A45A 64E4 94C0 809C FFF6 4C48 4ECD DFDB
Attachment:
pgpGiO5kV9bpP.pgp
Description: PGP signature
-- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list