Quote:
|
Originally Posted by danielf
The only reason I can think of is to make it look like it is some other file, which can hardly be a legitimate reason...
|
There are legitimate reasons you can do this (and I have done in the past). I caught a user running port scans (which, while it's not, strictly speaking, against the rules, it is bending them ). I wrote a little program that when run, displayed "Access Denied", padded it out to the same size as the program he was using, overwrote the program he was using (making sure to preserve the date stamp). Then watched as he tried to do a port scan.