Hi everyone, I am not sure if this is the right place to post the question. I did the following on my system. strings /dev/mem > out Later I opened the file "out" in vim and found out that if I search for login, I get the user name and corresponding password in plain text near about ten lines where i found login. To gain root by buffer overflows is one way of breaking in. But that can be patched when it is revealed. If someone does get a root shell using buffer overflows and then does the strings /dev/mem , he can get a backdoor anytime (unless the password is changed). Is there any workaround for this problem or can the kernel be patched to encrypt such pages containing passwords? I am not sure if this is a kernel question or not but /dev/mem was all about memory etc so I posted it here. Thanks in advance for your replies. Regards, Mohit Kalra "CRC ERROR - error while reading signature" -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ IRC Channel: irc.openprojects.net / #kernelnewbies Web Page: http://www.kernelnewbies.org/