On Thu, Dec 24, 2015 at 1:04 AM, Shrinivasan T
wrote:
> Last weekend, I had a great learning about backups from one of our
> customers.
>
> We had few servers attacked by rootkits.
> Few binaries were installed in 5 servers and they started to consume
> network bandwidth highly. A new mail server
On Wed, Dec 23, 2015 at 1:34 PM, Shrinivasan T wrote:
> Last weekend, I had a great learning about backups from one of our
> customers.
>
> We had few servers attacked by rootkits.
> Few binaries were installed in 5 servers and they started to consume
> network bandwidth highly. A new mail server
On Thu, 2015-12-24 at 01:04 +0530, Shrinivasan T wrote:
> We had few servers attacked by rootkits.
Any investigations about the rootkits? how did they come in? how did
they spread?
Would be helpful to learn and take steps to prevent.
Thanks,
Mohan R
__
Thanks for the suggestions Vik.
Doing the same things.
___
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
ILUGC Mailing List Guidelines:
http://ilugc.in/mailinglist-guidelines
On 23/12/15 19:34, Shrinivasan T wrote:
> 5. Setup intrusion detection systems for critical servers. I thought it was
> boring and not an essential one. But understood the importance of them.
But probably not on any of those critical servers themselves. If you
have a switch on your network with a
Last weekend, I had a great learning about backups from one of our
customers.
We had few servers attacked by rootkits.
Few binaries were installed in 5 servers and they started to consume
network bandwidth highly. A new mail server was installed recently and it
started to send spam mails. We misse