help analyzing an attack
Pavel Zaitsev
pavel-XHBUQMKE58M at public.gmane.org
Wed Apr 18 06:00:57 UTC 2007
Jamon Camisso(jamon.camisso-H217xnMUJC0sA/PxXw9srA at public.gmane.org)@Wed, Apr 18, 2007 at 12:24:04AM -0400:
> If it's a compromised root account, you're best off backing up your data
> and reinstalling.
I agree with Jamon, as long as most of your data is not code. If it is code,
there shall be validation of code, if copy of this code is only on that
system.
Cheers,
Pavel
--
Create like God. Command like a King. Work like a Slave.
http://perlpimp.com | http://static.md5.ca/resume.pdf
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list