On Wed, Aug 28, 2002 at 12:53:41PM -0500, Jonathan Johnson wrote: > take it off-line until you have cleared this up.
And rebuild it from scratch. Pretend it be an infected terminal patient: Do you want any transplants or transfusions coming from it? No. Get and use trusted distribution CDs, download new copies of anything you need that isn't on those CDs. If you have data you have to copy off the infected machine be vary careful. Boot off a rescue CD first and carefully copy only non-executable data (no executable binaries nor source code). Assume everything you have typed on the infected machine has been overheard, which includes all passwords. Get new passwords and don't type them on the infected system. Pretend you are in the presence of an unknown infectious disease. (You are.) Once you get your new system build, keep it up to date! A perfectly secure system can be cracked in very short order once a new vulnerability is discovered. -kb -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list