Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Dec 1996 10:17:24 -0500 (EST)
From:      Brian Tao <taob@io.org>
To:        Stephen Fisher <lithium@cia-g.com>
Cc:        FREEBSD-SECURITY-L <freebsd-security@freebsd.org>
Subject:   Re: Risk of having bpf0? (was URGENT: Packet sniffer found on my system) 
Message-ID:  <Pine.BSF.3.95.961212101626.22183H-100000@nap.io.org>
In-Reply-To: <Pine.BSI.3.95.961212073226.2381E-100000@maslow.cia-g.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 12 Dec 1996, Stephen Fisher wrote:
> 
> Can't the hacker just recompile the kernel with bpf support and then use
> it, though?

    You would have to reboot the machine for a new kernel to take
effect, and hopefully your kernel is included in whatever trojan horse
scans you do.
--
Brian Tao (BT300, taob@io.org, taob@ican.net)
Senior Systems and Network Administrator, Internet Canada Corp.
"Though this be madness, yet there is method in't"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.961212101626.22183H-100000>