Dear fellow Puppians! Woof
Recently I had a discussion with a long-time friend.
It began when I explained my ageing P4 desktop 'fell on it's sword' and how I replaced it with a more modern desktop.
I got the replacement very cheap, because the machine was password protected and no-one could crack the password.
I just reformatted the HDD (and erased Windows). After that, it took about 15 minutes to install uPupBB32 and the world was a better place. (Certainly a much faster place!)
My friend explained the vulnerabilities of the Puppy Linux system.
I explained that the OS itself was (or could be) read-only. Personally I rarely boot from a CD - but it's possible.
I did this often in the past, but booting from a CD is slower than booting from a HDD or flash-drive.
My friend countered by explaining how the OS files ON THE SERVER could be 'infiltrated' and replaced.
(The problem isn't just your machine. The server is also vulnerable. Hmmm ....
That (of course) would involve also replacing the corresponding checksum file(s) (MD5 ... SHAx and so on).
Additionally, I think the actual size of the key files is known to the byte, so if both the master files and the MD5 files were exchanged the byte-count is still available as an additional point to check. A 'corrupter' could, (I suppose) 'pack' the original with null bytes and make the byte count for the 'original' and the 'fake' file the same.
At any rate, the point of this posting is a feeble attempt to understand the likely-hood of corrupting Puppy Linux.
For those who doubt, I must explain I have fairies in my back-yard. Anything is possible.
cobaka
PS My friend/colleague is obsessed with the idea of viruses, worms, foreign agents (and so on) taking over his desktop.