On Fri, 2008-06-27 at 22:04 +0300, Gilboa Davara wrote:
On Fri, 2008-06-27 at 12:21 -0500, Kevin Martin wrote:
> <snip>
> > Its a bad idea to install something like that on your machine anyway.
> > An attacker will probably know of all such common tools floating
> > around, like a prepackaged rpm, and check for their existence, they
> > find it, you save them the trouble of installing one, they spend their
> > time copying the log you've so conveniently assembled for them. Your
> > concerned about security and your going to trust someone else's
> > prepackaged keylogger? Better just restrict what the machine can
> > do....there is a tool to help with this but you know I just can't
> > remember the name.
> >
> >
>
> Maybe he's a parent trying to see what his kid(s) are really doing on
> the internet?
>
> Other more serious trust/discipline issues involved here, I know, but
> still, this might be what's going on.
>
> Kevin
>
... Using a key logger?!?!?!?
Wouldn't it be far easier to look at the Firefox/etc cache?
- Gilboa
What would a browser cache tell you about shell commands?