Technology Software

Introduction to Linux

10.4.7. Have I been hacked?


How can you tell? This is a checklist of suspicious events:
  • Mysterious open ports, strange processes.
  • System utilities (common commands) behaving strange.
  • Login problems.
  • Unexplained bandwidth usage.
  • Damaged or missing log files, syslog daemon behaving strange.
  • Interfaces in unusual modes.
  • Unexpectedly modified configuration files.
  • Strange entries in shell history files.
  • Unidentified temporary files.

    * License

    * Introduction to Linux Index

    Leave a reply