From: Darrell Greenwood on

In article <826j5dF88aU1(a)mid.individual.net>, Jeffrey Goldberg
<nobody(a)goldmark.org> wrote:

> If there were some browser exploit or the like that could silently run
> arbitrary code, you would be prompted to authenticate if that arbitrary
> code tried to do things outside your part of the system.

And hopefully tipping me off in the process.

Putting my regular account username in sudoers has simplified things
considerably. I have one program used daily, tripwire, which required
su to update, now it doesn't.

Thank you!

Cheers,

Darrell

p.s., A Windows trojan landed on my desktop the other week. Out of
curiosity I duplicated a Parallels Virtual Machine and ran the trojan
just to see what happens. It was scary watching the trojan silently
burying itself immediately and then just erasing itself from the
desktop without a murmur from the Windows OS.
Curiosity satisfied, I deleted the VM.

--
To reply, substitute .net for .invalid in address, i.e., darrell.usenet7 (at)
�telus.net