From: Darrell Greenwood on 8 Apr 2010 14:49 In article <826j5dF88aU1(a)mid.individual.net>, Jeffrey Goldberg <nobody(a)goldmark.org> wrote: > If there were some browser exploit or the like that could silently run > arbitrary code, you would be prompted to authenticate if that arbitrary > code tried to do things outside your part of the system. And hopefully tipping me off in the process. Putting my regular account username in sudoers has simplified things considerably. I have one program used daily, tripwire, which required su to update, now it doesn't. Thank you! Cheers, Darrell p.s., A Windows trojan landed on my desktop the other week. Out of curiosity I duplicated a Parallels Virtual Machine and ran the trojan just to see what happens. It was scary watching the trojan silently burying itself immediately and then just erasing itself from the desktop without a murmur from the Windows OS. Curiosity satisfied, I deleted the VM. -- To reply, substitute .net for .invalid in address, i.e., darrell.usenet7 (at) �telus.net
|
Pages: 1 Prev: How to make mac shut down faster SOLUTION Next: MacBook vs. FaceBook |