Quote (newby @ July 09 2006,01:16) |
You may be right that other exploits will be more attractive. But, the last step in almost any exploit is the instalation step. Put robust protection there and one will stop a lot of malware. It's probably not even in ap-get, probably down in the kernel. |