On 4/16/06, George Toft wrote: > > To preclude a rootkit, you can always boot the box using Knoppix, then > mount the suspect disk and look at /etc/shadow. > Unless it's a kernel-mode rootkit, in which case it more than likely wouldn't use /etc/shadow.