Describe the “Trojan horse” technique for capturing a super-user password.
What will be an ideal response?
One might capture the super-user password via a “Trojan Horse” technique by creating a shell
script called “su” that prompted for the root password just like the real su command does and
writes it to a file and exits. By placing it somewhere ahead of the real su in the super-user’s
PATH, they might execute your version instead.
You might also like to view...
16. The term OS stands for
a. Operating System b. Oscillating System c. Operations Services d. Nothing
Suppose a method p has the following heading:
``` public static int[][] p() ``` What return statement may be used in p()? a. return 1; b. return {1, 2, 3}; c. return int[]{1, 2, 3}; d. return new int[]{1, 2, 3}; e. return new int[][]{{1, 2, 3}, {2, 4, 5}};
Which command is used to change one dimension (height or width) of an object, causing the other dimension to change automatically to maintain the proportion?
A) Fill B) Crop to Shade C) Crop D) Lock aspect ratio
The first version of HTML was a descendent from what other language?
A) XML B) SGML C) HTTP D) XHTML