aboutsummaryrefslogtreecommitdiffstats
path: root/THOUGHTS
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--THOUGHTS2
1 files changed, 1 insertions, 1 deletions
diff --git a/THOUGHTS b/THOUGHTS
index b073b5ff2..1ff9e92f1 100644
--- a/THOUGHTS
+++ b/THOUGHTS
@@ -23,7 +23,7 @@ conditional.
more secure than swapping out to the swap disk? I don't
believe so because if an attacker has access to the physical
box (and he needs this to look at the swap area) he can also
- leave a trojan horse which is far more easier than to analyze
+ leave a Trojan horse which is far more easier than to analyze
memory dumps. Question: Is it possible that a Unix pages
an old (left over by some other process) swap page in for
another process - this should be considered a serious design