[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]
protection from malicious programs
Hi All,
Here is the abstract from the page :
--
After a machine is compromised, malicious users tend to replace
commonly used programs with trojan horses (programs that execute
malicious instructions in addition to their normal functions).
Packages of such trojan horses are widely distributed over the
Internet, and are easily accessible by anyone. Therefore, it
becomes important to protect programs from being replaced by
malicious users.
--
Rest of article here :
http://www.dhanjani.com/programming/linuxexechash
feel free to pass on.
BGa
---
Send e-mail to 'ilugc-request@xxxxxxxxxxxxxxxxxx' with 'unsubscribe'
in either the subject or the body to unsubscribe from this list.