Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

10.5.7. Have I been hacked?

How can you tell? This is a checklist of suspicious events:

  • Mysterious open ports, strange processes.

  • System utilities (common commands) behaving strange.

  • Login problems.

  • Unexplained bandwidth usage.

  • Damaged or missing log files, syslog daemon behaving strange.

  • Interfaces in unusual modes.

  • Unexpectedly modified configuration files.

  • Strange entries in shell history files.

  • Unidentified temporary files.

Introducing Linux
Previous Page Home Next Page

 
 
  Published under the terms of the GNU General Public License Design by Interspire