Hello guys,
I will try to formulate an old question with other words, for the benefit of intuition and relying on your knowledge that is more solid than mine.
I already discuss with ShelLuser a first approach to the question.
ps ux - list all the program with superuser privileges.
QUESTION.
Have you experienced (at least once in your life of FreeBSD administrators and programmers) of programs or daemons, with superuser benefit, that "have broken" the mount command (used in read-only mode) and penetrated the filesystem of an attached device ?
At least one !
At least one name of these demons is enough for me, and on what conditions you experienced this behaviour.
In particular this questions refers to GUI O.Ses. .... Honestly, I think that FreeBSD, used in CLI mode, is quite untouched to these phenomena.
See you !
I will try to formulate an old question with other words, for the benefit of intuition and relying on your knowledge that is more solid than mine.
I already discuss with ShelLuser a first approach to the question.
ps ux - list all the program with superuser privileges.
QUESTION.
Have you experienced (at least once in your life of FreeBSD administrators and programmers) of programs or daemons, with superuser benefit, that "have broken" the mount command (used in read-only mode) and penetrated the filesystem of an attached device ?
At least one !
At least one name of these demons is enough for me, and on what conditions you experienced this behaviour.
In particular this questions refers to GUI O.Ses. .... Honestly, I think that FreeBSD, used in CLI mode, is quite untouched to these phenomena.
See you !