Thursday, July 9, 2009

How does the Linux hacker get into the system and eliminate the back door?

A user using Linux gets into the system. How does the user get in?

How does the Linux hacker get into the system and eliminate the back door?
they wont eliminate the back door, they will make one and use it so they can get back in later without the effort it took first time. How to get in? I'm sure google could narrow it down for you.......


No comments:

Post a Comment