On Wed, Aug 28, 2002 at 12:53:41PM -0500, Jonathan Johnson wrote:
> take it off-line until you have cleared this up.

And rebuild it from scratch.  Pretend it be an infected terminal
patient: Do you want any transplants or transfusions coming from it?
No.  Get and use trusted distribution CDs, download new copies of
anything you need that isn't on those CDs.  If you have data you have
to copy off the infected machine be vary careful.  Boot off a rescue
CD first and carefully copy only non-executable data (no executable
binaries nor source code).  Assume everything you have typed on the
infected machine has been overheard, which includes all passwords.
Get new passwords and don't type them on the infected system.

Pretend you are in the presence of an unknown infectious disease.
(You are.)

Once you get your new system build, keep it up to date!  A perfectly
secure system can be cracked in very short order once a new
vulnerability is discovered.


-kb



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to