Paul Walker on 10 Aug 2015 18:57:26 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] Security breach post morten


Assuming that a system has had a security breach, what are tools and procedures that people would use to evaluate filesystem backups and database dumps for the presence of malicious code, unauthorized user accounts, malware, etc?
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug