PDA

View Full Version : Monitoring


  1. Step 4 - Install chkrootkit to scan system for signs of hacking
  2. Step 3 - Install AIDE for detecting changes made to files
  3. Step 2 - Install BFD for detecting brute force attacks
  4. Step 1 - Install some custom made scripts
  5. Checklist: "Have I been Hacked?"