Hi everyone, I wonder how the PAM module used in login can prevent the modification from the hostile user(someone may modify all the return values of the PAM module to PAM_SUCCESS to cheat the system). Any help will be welcome! Best regards, Nic ____________________________________________________________________________________ Yahoo! oneSearch: Finally, mobile search that gives answers, not web links. http://mobile.yahoo.com/mobileweb/onesearch?refer=1ONXIC _______________________________________________ Pam-list mailing list Pam-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/pam-list