Latest LQ Deal: Complete CCNA, CCNP & Red Hat Certification Training Bundle
Go Back > Blogs > unSpawn
User Name


Rate this Entry

Required Reading: After an Exploit: mitigation and remediation

Posted 07-25-2006 at 06:05 AM by unSpawn
Updated 07-08-2011 at 06:49 PM by unSpawn (Changed URI from SecurityFocus:2006 to Symantec:2010)

After an Exploit: mitigation and remediation.
"In this article we describe a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks and the brute-forcing of SSH passwords. The article then looks at what an administrator should do post-compromise."
Posted in Uncategorized
Views 911 Comments 0
« Prev     Main     Next »


All times are GMT -5. The time now is 12:46 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration