It's also trivial to modify your example module to protect your syscall
table, or at least notify when your table has been modified. Turn-about is
fair play.
> The implications should be obvious. Once a compromise has taken place,
> nothing can be trusted, the operating system included.
Like, duh...
> Be afraid. Be very afraid. ;)
Just yet another reason for a complete re-install after a compromise.
- Steve
.------------------------------------------------. # * # # # # # #
| Steve Baker | Barely Working | # ## # # # # #
| ice@mama.indstate.edu | System Administrator | # # # # # # # #
| Red-Hat Rulz! | Will work for hardware | # # # ## # # # #
`-- SYS-ADMIN FOR HIRE, HAVE UNIX, WILL TRAVEL --' #### # # # ## # #