The article talks about a security hole in an old version of Red
Hat Linux, and they give vague references to a rootkit program used
to control a server once it has been cracked.
The article talks about a security hole in an old version of Red
Hat Linux, and they give vague references to a rootkit program used
to control a server once it has been cracked.