Joined: Nov. 2005
||Posted: July 09 2006,12:35
|Quote (newby @ July 09 2006,01:16)|
|You may be right that other exploits will be more attractive. But, the last step in almost any exploit is the instalation step. Put robust protection there and one will stop a lot of malware. It's probably not even in ap-get, probably down in the kernel.|
That's why *nix has root. The robust protection already is in the kernel - Don't run user sessions as root. If you're really worried about the security of you system, you can keep up to date on existing exploits at http://www.debian.org/security/.
eTower 566.12, 32MB RAM, 7GB HD, 200MB swap, 1x USB v.1, Intel 810GFX, Intel 810 Audio.
Recompiled so far: Pretty much everything. I think I'll have to do a remaster to cut the growing bloat off my system.