Quick question - 08/31/03 03:40 AM
Just a quick question to anyone who can be bothered to answer.
Lets suppose you had physical access to a system(in this example its a mandrake based system), which way do you think would be best to hack root?
Lets suppose you had physical access to a system(in this example its a mandrake based system), which way do you think would be best to hack root?