Linux wrote:
However, this should *never* be used alone for security concerns. A compromiser can easily run that simple mount command to remount read-write after root access.
I've been reading some of your recent comments, Anonymous looser, and I've really got to say this - you seem to make some authoritative style comments on things you really dont know much about. eg. in this case - the filesystem could be mounted readonly since its only exposed readonly from the underlying i/o or block subsystem.
- KB