On Tuesday 23 August 2005 12:57, Alvin Oga wrote:
> personally... i think any hacked machine should be looked over
> carefully to be able to answer the following:
>       - who broke in
>       - how did they get in
>       - why did they break in ( sometimes there's no answer )
>       - where they came from
>       - how many times did they come in
>       - how many prev attempts did they try
>       - how long before you noticed them
>       - what other machines did they break into
>         ( esp for those of you that like passwordless logins )
>       - what text files were read or edited
>       - which binaries and libraries did they modify
>       - what extra directories and files exists
>       - what did they sniff and for how long ( passwds )
>       - .. endless list ..

Nice... can you also provide some info on how to find answers to these 
questions? This would be very useful... just in case. :)

Cheers
Arne
-- 
Arne Götje (高盛華) <[EMAIL PROTECTED]> 
(Spam catcher.  Address might change in future!)
PGP/GnuPG key: 1024D/685D1E8C
Fingerprint: 2056 F6B7 DEA8 B478 311F  1C34 6E9F D06E 685D 1E8C
Key available at wwwkeys.pgp.net.   Encrypted e-mail preferred.

Attachment: pgpqcLaLWoKT1.pgp
Description: PGP signature

Reply via email to