(on 02/20/2020 at 7:34pm mountain time, Frank said)
> Another suggestion, get Wireshark for sniffing traffic,
> run a sniffer trace as you are using the machine. You'll
> want to capture any IP (layer 3) traffic leaving or
> entering your machine (may want to setup filters to reduce
> capture size). This may be a way to start your analysis.

> Disable any services (daemons) running on the machine that
> are not required with a listening port:
> sudo netstat -tulpn | grep LISTEN
> above will display listening ports
> This is at least a start

Except for the netstat command, that went over my head.  I have no training in sysadmin and IT security.  I'm a home user.  I don't know how to do what you suggest, or what to look for in the output.

Output to the netstat command is the same as what I put in my earlier reply to Ed.

(my own idea) I tried wading through several thousand lines of journalctl output.  I couldn't even find my 2 logins since the last boot (late this morning).  I vaguely recall a few years ago stumbling onto large numbers of hack attempts noted in journalctl output, but I don't remember what to look for.
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to