News Register Control Panel Private Messages Members List Team Search News Posts About Us
 

Back Channeling using Xterm
  Author: Ravish Ahuja
Added: 12/21/2002
Type: Tutorial
Viewed: 15633 time(s)
Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10
Additional security tips

However, the protection against such attacks is extremely difficult. So, the best way is to make your self secure by removing unnecessary programs and services. You can increase your security and protect against such attacks by removing X from your system. Due to the vulnerabilities in X binaries, local users may also escalate their privileges to root besides shovelling xterm to remote attacker.

Article Pages:  � Prev | 1 | 2 | 3 | 4  




How would you rate this article:    Bad Good   Go � 


� Copyright Linux Advisory 2003. All rights reserved.
We are not responsible for the comment and story contributed by users.