- 5,622
- eMadman
my RSS reader just updated and I came across this link. It's the basic techniques that computer forensics experts use when they analyze compromised linux systems. I found it to be an interesting read...but it could simply be because I'm a geek like that
.
Part 1:
http://www.securityfocus.com/infocus/1769
Part 2 - more geeky details than you can shake a stick at:
http://www.securityfocus.com/infocus/1773
Part 1:
http://www.securityfocus.com/infocus/1769
Part 2 - more geeky details than you can shake a stick at:
http://www.securityfocus.com/infocus/1773