On Sat, May 24, 2008 at 8:29 PM, Fred Noz <Fred@xxxxxxx> wrote: > In addition to easy maintenance, readonly-root adds a layer of security. > The security is broken if someone gains access to the root user, but > then many security protections are lost if someone gains root. However, this should *never* be used alone for security concerns. A compromiser can easily run that simple mount command to remount read-write after root access. But sometimes before gaining root access, some system spesific files are over-written to gain root access with the help of exploits.. This helps keeping from them. _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos