Visit the LQ Articles and Editorials section
Go Back > Blogs > unSpawn
User Name


Rate this Entry

Required Reading: After an Exploit: mitigation and remediation

Posted 07-25-2006 at 05:05 AM by unSpawn
Updated 07-08-2011 at 05:49 PM by unSpawn (Changed URI from SecurityFocus:2006 to Symantec:2010)

After an Exploit: mitigation and remediation.
"In this article we describe a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks and the brute-forcing of SSH passwords. The article then looks at what an administrator should do post-compromise."
Posted in Uncategorized
Views 672 Comments 0
« Prev     Main     Next »


All times are GMT -5. The time now is 06:41 PM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration