Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 25 Jan 2002 18:05:37 -0500 (EST)
From:      Robert Simmons <rsimmons@wlcg.com>
To:        freebsd-security@freebsd.org
Subject:   theo
Message-ID:  <20020125175928.H41011-100000@mail.wlcg.com>

next in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Lets say someone has a machine they don't have console access to, but they
know that the OS comes back every time they reboot the fucker.

The kernel is on the old hard drive, with the swap garbage.  The brand
spanking new OS is mirrored on a twed.  How can I tell that the core
team's brand spanking newly de scriptkiddified kernel is the one that
boots?  dmesg?

BTW, there isn't a floppy installed, nor a CD_ROM.

Also, you win, you people get the prize for the most security alerts in
one year. :)

Robert Simmons
Systems Administrator
http://www.wlcg.com/
E3E2 C83A 95A2 DDDC BF7F 6889 74B6 5850 880E B566
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE8UeTFdLZYUIgOtWYRA0WUAJwPjBg/vQtqHeICIEZq5ru3o8Y3DACgo5H1
L+E8eAkNkU9TiPxf9gsfMPc=
=3yoL
-----END PGP SIGNATURE-----



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020125175928.H41011-100000>