From: ichudov@algebra.com (Igor Chudov @ home)
To: markm@voicenet.com (Mark M.)
Message Hash: 67951aa5d24389cd2d25de0f9d18890cb4a6640bfe96e4b5fd3933d213c1a8c5
Message ID: <199609012149.QAA00600@manifold.algebra.com>
Reply To: <Pine.LNX.3.95.960901141631.186B-100000@gak>
UTC Datetime: 1996-09-01 23:38:52 UTC
Raw Date: Mon, 2 Sep 1996 07:38:52 +0800
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Mon, 2 Sep 1996 07:38:52 +0800
To: markm@voicenet.com (Mark M.)
Subject: Re: Moscowchannel.com hack
In-Reply-To: <Pine.LNX.3.95.960901141631.186B-100000@gak>
Message-ID: <199609012149.QAA00600@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text
Mark M. wrote:
> > A hacker who has root can forcibly unmount the cdrom and mount another
> > directory on that node. Not a good solution.
>
> As soon as the sysadmin finds out, said directory can be unmounted and CD-ROM
> device can be remounted. Besides, if someone manages to get root access on any
> machine, the sysadmin of that machine is basically screwed anyway. It's much
> better than having to back up the web page on a tape and having to restore the
> data when it is altered.
It depends on the ratio
R = (frequency of legit Web page changes) / (frequency of breakins
* cost of a breakin).
The lower is R, the more what you say makes sense. I suspect that
in the real world R is rather high.
- Igor.
Return to September 1996
Return to “snow <snow@smoke.suba.com>”