Information
These steps only applicable on Solaris 8 and later systems. A corrupted root file system is one mechanism that an attacker with physical access to the system console can use to compromise the system. By enabling the 'logging' option on the root file system, it is much more difficult for the root file system to become corrupted at all, thwarting this particular type of attack.