Re: Kernel extensions and code injection?
site_archiver@lists.apple.com Delivered-To: darwin-kernel@lists.apple.com Organization: Qrrbrbirlbel User-agent: Opera M2(BETA1)/8.0 (MacPPC, build 1945) - Brian On Mon, 21 Mar 2005 01:38:19 -0800, Mike Smith <drivers@mu.org> wrote: _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-kernel mailing list (Darwin-kernel@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-kernel/site_archiver%40lists.a... Absolutely true. There's also other ways malicious coders could intercept keystrokes if they really wanted to, including ways of getting text in password fields, and there's not much we can do about it. When it comes to computers, thems the ropes; there will always be jerks who'll try to write programs that do this sort of thing. Fortunately, the good news with any kernel extensions is that there's *NO* way to install them without the user knowing exactly what you're doing and without them typing in an administrator password, which is probably one of the main reasons we don't come across Mac OS X viruses. There are *plenty* of things typed in non-password fields that should not be monitored... = Mike This email sent to site_archiver@lists.apple.com
participants (1)
-
Brian Kendall