LinuxSecurity.com: Using Chroot SecurelyFeb 12, 2002, 15:01 (8 Talkback[s])
(Other stories by Anton Chuvakin)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
[ Thanks to LinuxSecurity Contributor for this link. ]
"chroot command and chroot system call might sound like a good security measure - one command executed and plain old UNIX "cd /" no longer transports you to a root directory of the system. Instead, you are bound to stay in the restricted part of the filesystem, surrounded only by files chosen by a paranoid system administrator. In fact, that is how it should be.
0 Talkback[s] (click to add your comment)