The case of the thirty minute hack was where a remote user
allowed to log on through ssh was able to elevate his priveliges.
that's a serious issue if you are allowing remote users to have shell...
Search:Type: Posts; User: rcgreen; Keyword(s): Search: Search took 0.05 seconds.
Results 1 to 1 of 1
|
|