LINUX.ORG.RU

http://www.cs.virginia.edu/~an4m/books/oreilly/unix_bookshelf/ksh/ch10_03.htm:

10.3.3 Tracked Aliases

The Korn shell protects against this type of scheme in two ways. First, it defines tracked aliases (see Chapter 3) for just about all commonly-used utilities: ls, mv, cp, who, grep, and many others. Since aliases take priority over executable files, the alias will always run instead of the Trojan horse.

Furthermore, the shell won't let you know about these if you type alias -t to see all tracked aliases. [6] You'll have trouble finding a command to use as your Trojan horse if you want to break in. This is a very clever-and undocumented-security feature.

[6] Unless you type whence -v command or type command. If command has a tracked alias, this will say so, and it will cause alias -t to report it next time.

Die-Hard ★★★★★
()
Ответ на: комментарий от UVV

И правда - человек, кажется, ФАК по zsh переводит ;)

<off>UVV, я тебе на твое письмо сегодня ночью отвечу</off>

K48 ★★★★
()
Вы не можете добавлять комментарии в эту тему. Тема перемещена в архив.