Hi Reuben > If I recall correctly, you mentioned that the blackhole file was > an executable / binary, rather than a source code. So it's probably > already compiled and dropped to your machine. 100% Correct. What I cannot understand is how the file would have been transferred. Would it have been possible that the hacker used Apache on the box and simply uploaded the file? The mind boggles. Regards Chris -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list