Date: Fri, 25 Jan 2002 18:05:37 -0500 (EST) From: Robert Simmons <rsimmons@wlcg.com> To: freebsd-security@freebsd.org Subject: theo Message-ID: <20020125175928.H41011-100000@mail.wlcg.com>
next in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Lets say someone has a machine they don't have console access to, but they know that the OS comes back every time they reboot the fucker. The kernel is on the old hard drive, with the swap garbage. The brand spanking new OS is mirrored on a twed. How can I tell that the core team's brand spanking newly de scriptkiddified kernel is the one that boots? dmesg? BTW, there isn't a floppy installed, nor a CD_ROM. Also, you win, you people get the prize for the most security alerts in one year. :) Robert Simmons Systems Administrator http://www.wlcg.com/ E3E2 C83A 95A2 DDDC BF7F 6889 74B6 5850 880E B566 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE8UeTFdLZYUIgOtWYRA0WUAJwPjBg/vQtqHeICIEZq5ru3o8Y3DACgo5H1 L+E8eAkNkU9TiPxf9gsfMPc= =3yoL -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020125175928.H41011-100000>