Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

10.5.8. Recovering from intrusion

In short, stay calm. Then take the following actions in this order:

  • Disconnect the machine from the network.

  • Try to find out as much as you can about how your security was breached.

  • Backup important non-system data. If possible, check these data against existing backups, made before the system was compromised, to ensure data integrity.

  • Re-install the system.

  • Use new passwords.

  • Restore from system and data backups.

  • Apply all available updates.

  • Re-examine the system: block off unnecessary services, check firewall rules and other access policies.

  • Reconnect.

Introducing Linux
Previous Page Home Next Page

 
 
  Published under the terms of the GNU General Public License Design by Interspire