Does anybody know where there's a checklist of things to look at on a RH 
server which you suspect (or know) to have been hacked?  I've got a friend 
who's server got hacked and before doing a complete re-install we wanted to 
poke around a bit.  I'd like to find a list of things to check to find out 
how they got in and what are the most likely things they might change.  Is 
there such a list?  I know it would be changing all the time if you had a 
complete list, I'm just looking for maybe the top 20 things to check or 
something like that.
Tnx,
Kerry Miller
Dura-Line Corp.
Dallas, TX



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to