Well, I just remembered hearing about rootkits. I think all you need is access to a user and a rootkit, but I haven't used one so I wouldn't know...but a simple google search came up with some linux rootkits :p