>There are easier ways, than >Ken's, to compromise a Linux systems depending on if you want "user >level" or "superuser level". Just none have achieved greater than unity >propagation ratio. Hence, they die out. We know this how?