LinuxQuestions.org
Review your favorite Linux distribution.
Go Back   LinuxQuestions.org > Blogs
User Name
Password

Notices

Old

Non-authoritative scan results of BitDefender, ClamAV, F-prot and NOD32

Posted 10-14-2006 at 04:41 AM by unSpawn
Tags antivirus

Here's some scan results of running BitDefender, ClamAV, F-prot and NOD32 on a stash of aproximately 10K files containing a mixed set of Root kits, LKM's, tools and w32 goodies:
Files scanned: BDC: 12113, NOD32: 11000, F-prot: 9375, ClamAV: 9280.
Threats / infected + suspected files found: BDC: 537, NOD32: 421, F-prot: 366, ClamAV: 150.

More details here: http://www.linuxquestions.org/questions/showthread.php?t=491870
Moderator
Posted in Uncategorized
Views 1546 Comments 0 unSpawn is offline
Old

Rootkit Hunter release 1.2.9

Posted 09-29-2006 at 10:47 PM by unSpawn

Yeah, we finally did it, 1.2.9 is here!

My sincere thanks to all who made this project and this release possible: the Rootkit Hunter project team, all contributors and testers, all RKH users, those who kept nagging us for a release, Linuxquestions.org, Sourceforge for unfaltering support and Michael Boelen for providing RKH and relinquishing control.
Moderator
Posted in Uncategorized
Views 963 Comments 0 unSpawn is offline
Old

Required Reading: Detect and Clean a hacked server (like, not)

Posted 07-26-2006 at 04:47 PM by unSpawn

I wonder what would happen (think newbie) if I would trust information from one source? Take for instance Detect and Clean a hacked server T0rnkit Tutorial which says I can completely recover a compromised and rootkitted box *just by deleting and installing some tools*. Of course *you* know that's completely wrong (and the comments say that as well) because you've read more docs (or had the experience of having to mop up after a breach). But how about someone who doesn't see the comments? Someone...
Moderator
Posted in Uncategorized
Views 604 Comments 0 unSpawn is offline
Old

Here we go...

Posted 07-26-2006 at 08:12 AM by unSpawn

Rootkit Hunter: new project leader.
Moderator
Posted in Uncategorized
Views 777 Comments 0 unSpawn is offline
Old

Required Reading: After an Exploit: mitigation and remediation

Posted 07-25-2006 at 05:05 AM by unSpawn
Updated 07-08-2011 at 05:49 PM by unSpawn (Changed URI from SecurityFocus:2006 to Symantec:2010)

After an Exploit: mitigation and remediation.
"In this article we describe a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks and the brute-forcing of SSH passwords. The article then looks at what an administrator should do post-compromise."
Moderator
Posted in Uncategorized
Views 578 Comments 0 unSpawn is offline

  



All times are GMT -5. The time now is 08:06 AM.

Main Menu

My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration