Does anybody know where there's a checklist of things to look at on a RH
server which you suspect (or know) to have been hacked? I've got a friend
who's server got hacked and before doing a complete re-install we wanted to
poke around a bit. I'd like to find a list of things to check to find out
how they got in and what are the most likely things they might change. Is
there such a list? I know it would be changing all the time if you had a
complete list, I'm just looking for maybe the top 20 things to check or
something like that.
Tnx,
Kerry Miller
Dura-Line Corp.
Dallas, TX
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list