Linux wrote: > However, this should *never* be used alone for security concerns. A > compromiser can easily run that simple mount command to remount > read-write after root access. I've been reading some of your recent comments, Anonymous looser, and I've really got to say this - you seem to make some authoritative style comments on things you really dont know much about. eg. in this case - the filesystem could be mounted readonly since its only exposed readonly from the underlying i/o or block subsystem. - KB -- Karanbir Singh : http://www.karan.org/ : 2522219 at icq