home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: bull.sys.aix,comp.unix.aix
- Path: sparky!uunet!think.com!cass.ma02.bull.com!silverio
- From: silverio@cass.ma02.bull.com (Brian Silverio)
- Subject: Re: Changing name associated with a process
- Message-ID: <1992Jul23.115353.14791@cass.ma02.bull.com>
- Organization: Bull World Wide Information Systems Inc.
- References: <mwarren.711724488@rws1> <mwarren.711816903@rws1> <kelvin.711819412@thed.uk22.bull.com> <1992Jul22.234401.3114@cass.ma02.bull.com> <kelvin.711888803@thed.uk22.bull.com>
- Date: Thu, 23 Jul 1992 11:53:53 GMT
- Lines: 16
-
- kelvin@thed.uk22.bull.com (Kelvin J. Hill) writes:
-
- >Agreed on the concept of hiding 'sensitive' command line args, but I see the
- >probability that the same method could be used to disguise a trojan program.
-
- "OUCH!" Although clever people can simply make their executables have
- names like inetd and nfsd it does allow them to cover tracks better.
- Faced with two programs saying they are /etc/inetd you now have to
- look at other information to determine the "real" one. And if that
- other information can be changed.......
-
- --
- ____________________________________________________
- Brian D. Silverio b.silverio@bull.com
-
-
-