Scott Ehrlich wrote:
> There is a lot of talk about the vulnerable Linux kernel.   I'm simply
> wondering the telltale signs if a given system has been hacked?
> What, specifically, does a person look for?
>   

rpm -Va is a good start for modified binaries/libraries.
rootkit detectors is another thing you can try.


Other than that, it is checking your logs and looking for odd files 
lying around...
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to