As a result a maliciously constructed message might allow hackers to execute arbitrary commands on a target system with superuser privilege. |
File and process protection will guard even against root superuser changes. |
It's best to run these as the superuser, because only root is allowed to invoke real-time priority. |
A properly exploited buffer overflow could allow a hacker to gain root, or superuser, access to a Sendmail server. |
If no errors were reported by the make process, become the superuser by typing su root and entering your root password, then type make install. |
Also, because A and B have superuser privileges, we have to wait for them to say okay to this sleep transition before it proceeds any further. |