Eugene Smiley on 10 Aug 2015 19:08:25 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Security breach post morten

I just went through a scare a while back, but took horrific notes on the subject.

What I do have written down is a list of various tools, some are only useful if set up before the incident.

chkrootkit and rkhunter

On Mon, Aug 10, 2015 at 6:57 PM, Paul Walker <> wrote:
Assuming that a system has had a security breach, what are tools and procedures that people would use to evaluate filesystem backups and database dumps for the presence of malicious code, unauthorized user accounts, malware, etc?

Philadelphia Linux Users Group         --
Announcements -
General Discussion  --

Philadelphia Linux Users Group         --
Announcements -
General Discussion  --