On Sun, 19 Jan 2003 14:58:41 -0800 "zhiren" <zhiren@bigvalley.net> wrote: > Really interesting! Let me prove it, so you can see it for yourself: Sorry. Your trick requires that: 1. I log in as root and interact with various apps that receive things from outside the machine. I don't. 2. I run programs as root that are susceptible to operating on such malicious code. I don't. Not that nobody does that. But they've been warned enough if they've heard twice not to do it. If being told doesn't do the trick, this method is just the lesson they need before something seriously bad happens. This just shows why I'm in no big hurry to see ordinary Win*DOH*s users rushing in and using linux without some education first. They need to start unlearning the pavlovian habit of running whatever they happen across, and to make sure to protect things by not using $SUPERUSER full time. But, anyone desiring to learn can use things like this as a good tool. Having something run "chmod -R a+wrx /" as root is another useful lesson for anyone wishing to see what that brings. Let's just say, it may as well be "rm -rf /" for the damage it does. -- Death is just Nature's way of saying, "Hey! You're not alive anymore!" -- Psyche-list mailing list Psyche-list@redhat.com https://listman.redhat.com/mailman/listinfo/psyche-list