From owner-freebsd-current Mon Jul 12 11:37:45 1999 Delivered-To: freebsd-current@freebsd.org Received: from mail-out.visi.com (tele.visi.com [209.98.98.17]) by hub.freebsd.org (Postfix) with ESMTP id D012515025 for ; Mon, 12 Jul 1999 11:37:40 -0700 (PDT) (envelope-from mestery@visi.com) Received: from isis.visi.com (isis.visi.com [209.98.98.8]) by mail-out.visi.com (Postfix) with ESMTP id 190AB1F821; Mon, 12 Jul 1999 13:37:32 -0500 (CDT) Received: from localhost (mestery@localhost) by isis.visi.com (8.8.8/8.8.8) with ESMTP id NAA16368; Mon, 12 Jul 1999 13:37:31 -0500 (CDT) X-Authentication-Warning: isis.visi.com: mestery owned process doing -bs Date: Mon, 12 Jul 1999 13:37:31 -0500 (CDT) From: To: Scott Michel Cc: freebsd-current@FreeBSD.ORG Subject: Re: Just the kind of news we needed... In-Reply-To: <199907121747.KAA02111@mordred.cs.ucla.edu> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi, On Mon, 12 Jul 1999, Scott Michel wrote: > If you haven't /.'d today, there's a news article purporting that > FreeBSD can be exploited via kernel modules: > > > http://thc.pimmel.com/ > I actually found the article a very good source of documentation on programming loadable modules for FreeBSD. Granted, I'm not sure of it's accuracy, but it was a worthwhile read for someone like myself who has only coded LKMs for Linux. Very interesting. -- Kyle Mestery | StorageTek's Storage Networking Group mestery@visi.com | http://www.freebsd.org/ mestery@netwinder.org | http://www.netwinder.org/ Protect your right to privacy: www.freecrypto.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message