help analyzing an attack
Dave Cramer
davec-zxk95TxsVYDyHADnj0MGvQC/G2K4zDHf at public.gmane.org
Wed Apr 18 13:14:56 UTC 2007
I understand what it is, what I'd like to know is how. Are there good
tools around for checking for rootkits ?
Dave
On 18-Apr-07, at 2:00 AM, Pavel Zaitsev wrote:
> Jamon Camisso(jamon.camisso-H217xnMUJC0sA/PxXw9srA at public.gmane.org)@Wed, Apr 18, 2007 at
> 12:24:04AM -0400:
>> If it's a compromised root account, you're best off backing up
>> your data
>> and reinstalling.
>
> I agree with Jamon, as long as most of your data is not code. If it
> is code,
> there shall be validation of code, if copy of this code is only on
> that
> system.
> Cheers,
> Pavel
>
>
> --
> Create like God. Command like a King. Work like a Slave.
> http://perlpimp.com | http://static.md5.ca/resume.pdf
> --
> The Toronto Linux Users Group. Meetings: http://gtalug.org/
> TLUG requests: Linux topics, No HTML, wrap text below 80 columns
> How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list