H_TeXMeX_H |
09-15-2010 08:19 AM |
Quote:
Originally Posted by Hangdog42
(Post 4098169)
This article should be mandatory reading for anyone connecting to the Internet.
|
I don't really agree with everything that is said, unless it is a server that is being attacked (yes, the article is for a Linux server). If it is my computer I'd take it offline ASAP, running the commands it says are only if you want to report the event (which is often a good idea, but also often completely useless). I've never had anyone respond to me by saying "thank you for your report, we will analyze it and take measures against the offender", in fact they don't even e-mail back, and I bet they don't even care unless it is an important server at an important company.
Now, you'll probably end up running those commands before you even realize that you've been hacked, just save the output then take it offline and continue with the rest.
Overall, I guess it's a decent summary.
|