Re: Kernel extensions and code injection?
Re: Kernel extensions and code injection?
- Subject: Re: Kernel extensions and code injection?
- From: "Brian Kendall" <email@hidden>
- Date: Tue, 22 Mar 2005 13:53:56 -0500
- Organization: Qrrbrbirlbel
Absolutely true. There's also other ways malicious coders could
intercept keystrokes if they really wanted to, including ways of getting
text in password fields, and there's not much we can do about it. When it
comes to computers, thems the ropes; there will always be jerks who'll try
to write programs that do this sort of thing.
Fortunately, the good news with any kernel extensions is that there's
*NO* way to install them without the user knowing exactly what you're
doing and without them typing in an administrator password, which is
probably one of the main reasons we don't come across Mac OS X viruses.
- Brian
On Mon, 21 Mar 2005 01:38:19 -0800, Mike Smith <email@hidden> wrote:
There are *plenty* of things typed in non-password fields that should
not be monitored...
= Mike
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Darwin-kernel mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden