An example of how running distcc can be dangerous. It uses the metasploit 3.1 msfgui3 to open a remote shell through distcc. The shell gets logged in as the distcc user. I have a detailed explanation here and a better video at my personal homepage
All opensource software world in motion.
See how to setup your Linux or BSD box, setup network and desktop environment, install Apache, MySQL, PHP and other software, setup mail server with spam filtering, configure system to get best performance and many other things.
An example of how running distcc can be dangerous. It uses the metasploit 3.1 msfgui3 to open a remote shell through distcc. The shell gets logged in as the distcc user. I have a detailed explanation here and a better video at my personal homepage