[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

protection from malicious programs



Hi All,

       Here is the abstract from the page :
       --
       After a machine is compromised, malicious users tend to replace
       commonly used programs with trojan horses (programs that execute
       malicious instructions in addition to their normal functions).
       Packages of such trojan horses are widely distributed over the
       Internet, and are easily accessible by anyone. Therefore, it
       becomes important to protect programs from being replaced by
       malicious users.
       --
       Rest of article here :
       
       http://www.dhanjani.com/programming/linuxexechash

       feel free to pass on.

BGa


---
Send e-mail to 'ilugc-request@xxxxxxxxxxxxxxxxxx' with 'unsubscribe' 
in either the subject or the body to unsubscribe from this list.