Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

if you cannot 'see' the commands and passwords etc., then a malicious interuder can also not see it. you need to build it with in mind that you will be owned. if you design it like that, then most of the complaints you have gotten are invalid. it can be that you yourself are trustworthy and good person, but this doesn't say that there might be unknown vulnerabilities in your code or infrastructure. once someone is on the box, they can see the same as you, but they might not be so kind as to drop the information.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: