Home » Archive

Articles in the Hacking Category

Featured, Hacking, Headline, Security »

[15 Mar 2013 | No Comment | ]

Is first time when I’m attending to Blackhat conf. I’m a little bit disappointed. Probably my expectation was pretty high. Anyway, I saw several good talks:

Share this post

Hide Bookmarks

Debian, Hacking, How-to, Kernel, Linux, Newbie, Recovery, Security, Ubuntu »

[9 Mar 2009 | No Comment | ]

When we auditing a Linux system we have a lot of good tools to monitor unexpected changes and unexpected behaviour of a system. Earlier we talked about rkhunter as a system check for rootkits and now, as an alternative, we will talk about chkrootkit (Determine whether the system is infected with a rootkit).

Share this post

Hide Bookmarks

Debian, Hacking, Linux, Newbie, Security, Ubuntu »

[7 Mar 2009 | 4 Comments | ]

GNU/Linux and other unix operating systems are a very hostile environments for viruses, but they are still in the front of other malware / exploits. The most dangerous malware under GNU/Linux are the rootkits.

Share this post

Hide Bookmarks

Debian, Featured, Hacking, How-to, Linux, Newbie, Recovery »

[4 Mar 2009 | One Comment | ]

Protecting your bootloader is intended for a desktop workstation and not for a production server. Why protecting your bootloader ? Because with a simple boot in single mode a malicious person can change your root password or steal your data. Protecting your bootloader with a password will protect your computer to run in single mode without your permission, but will not protect you to boot from a bootable cd if you don’t also protect your BIOS.

Share this post