On Wed, Dec 31, 2008 at 06:59:41AM +0800, Ed Greshko wrote: > Dave Feustel wrote: > > > > I'm doing an experiment to see if removing KDE files reduces the number > > of incidences of apparent security exploits ocurring on my system. > > > > > FWIW, if you are having successful attacks against your system it may be > your configuration rather than a specific specific set of packages. > Besides, you should identify the actual exploit that occurred and > determine the point of entry. > > Have you identified the actual exploit? How will you know if you have > actually found the issue and corrected it? What if you delete > files/applications and the attacker stops attacking? Have you actually > fixed anything? If the attack is coming over the network, have you > captured indications with a packet capture? You are asking a lot of good questions. The answer to the last question is no. > With little information that you've supplied some may think you are > jumping the gun. They are welcome to think what they want. -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines