Hi Ged,

On Wed, 2007-10-03 at 18:50 +0100, ged wrote:
> What's the chance of being taken over by these things ?
> How can I check for root kits on linux ?
> 

On a desktop/laptop client slim, very slim. On a server running popular
web applications, somewhat higher. On a system running out of date
popular web applications, or other applications that require external
connectivity inbound with an open firewall, even higher still.

It's a real piece of string thing. 

There are tools to check for "rootkits" and you can also enable some log
watching programs to see when people attempt to intrude. Both are
somewhat academic, because once you have found a rootkit or detect that
you have been compromised the general consensus is that you should wipe
the machine and start again. Trying to find and remove compromised
pieces on a system, and then certify confidence it isn't compromised any
more is not something I (or many other admins) would do.

Cheers,
Al.

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/

Reply via email to