Drew Weaver wrote: > If they got in via SSH and all they did was deface his website > they must be stand-up guys, huh? Indeed. I try to be reasonably quick about updates and the occasional short-notice ssh exploit is rather scary. --- I've found that at least 75-80% of the time there is a compromise the "hacker" doesn't have "local" access to the system, meaning a shell. They simply upload a script to /tmp, run it, and that's their damage. If they are getting in via SSH someone has a bad security policy. -Drew _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos