Home » Archive

Articles in the Hacking Category

Debian, Hacking, How-to, Kernel, Linux, Newbie, Recovery, Security, Ubuntu »

[9 Mar 2009 | No Comment | ]

When we auditing a Linux system we have a lot of good tools to monitor unexpected changes and unexpected behaviour of a system. Earlier we talked about rkhunter as a system check for rootkits and now, as an alternative, we will talk about chkrootkit (Determine whether the system is infected with a rootkit).

(adsbygoogle = window.adsbygoogle || []).push({});

Share this post

Hide Bookmarks

Debian, Hacking, Linux, Newbie, Security, Ubuntu »

[7 Mar 2009 | 4 Comments | ]

GNU/Linux and other unix operating systems are a very hostile environments for viruses, but they are still in the front of other malware / exploits. The most dangerous malware under GNU/Linux are the rootkits.

(adsbygoogle = window.adsbygoogle || []).push({});

Share this post

Hide Bookmarks

Debian, Featured, Hacking, How-to, Linux, Newbie, Recovery »

[4 Mar 2009 | One Comment | ]

Protecting your bootloader is intended for a desktop workstation and not for a production server. Why protecting your bootloader ? Because with a simple boot in single mode a malicious person can change your root password or steal your data. Protecting your bootloader with a password will protect your computer to run in single mode without your permission, but will not protect you to boot from a bootable cd if you don’t also protect your BIOS.

(adsbygoogle = window.adsbygoogle || []).push({});

Share this post