Paul Walker on 10 Aug 2015 18:57:26 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] Security breach post morten

Assuming that a system has had a security breach, what are tools and procedures that people would use to evaluate filesystem backups and database dumps for the presence of malicious code, unauthorized user accounts, malware, etc?
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --