Tagged articles
7 articles
Page 1 of 1
Shuge Unlimited
Shuge Unlimited
Mar 3, 2026 · Artificial Intelligence

OpenClaw Advanced Guide: 5 Modules to Turn Your AI Assistant from Basic to Expert

This comprehensive guide walks you through OpenClaw's five advanced modules—identity system, persistent memory, Skills, sub‑agents, and cron jobs—showing how to configure each with concrete file examples, JSON settings, and CLI commands so your AI assistant gains personality, long‑term recall, extensible capabilities, parallel processing, and automated workflows.

AI AssistantConfigurationCron Jobs
0 likes · 22 min read
OpenClaw Advanced Guide: 5 Modules to Turn Your AI Assistant from Basic to Expert
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Cron JobsForensicsLD_PRELOAD
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Laravel Tech Community
Laravel Tech Community
May 30, 2022 · Operations

Understanding and Using crontab for Task Scheduling on Linux

This guide explains how to install, start, and stop the crontab service, configure global and user-specific cron directories, write crontab entries with proper syntax, and apply advanced techniques such as output redirection, nohup, background execution, and date-based log naming for reliable Linux task automation.

Cron JobsLinuxcrontab
0 likes · 9 min read
Understanding and Using crontab for Task Scheduling on Linux
Liangxu Linux
Liangxu Linux
Feb 25, 2021 · Information Security

How to Automate Linux Incident Response and Analyze a Mining Malware

This article shares a step‑by‑step Linux incident‑response workflow, including an automated Bash information‑gathering script, analysis of malicious cron jobs and a 439‑line mining malware, its SSH‑based lateral spread, and practical cleanup procedures with a reusable toolbox on GitHub.

Bash AutomationCron JobsCryptocurrency Mining
0 likes · 13 min read
How to Automate Linux Incident Response and Analyze a Mining Malware
Liangxu Linux
Liangxu Linux
Dec 2, 2020 · Information Security

How a Hidden gpg-agentd Process Hijacked a CentOS Server and Spread via Redis and Masscan

A detailed forensic walkthrough reveals how a compromised CentOS server was hijacked via a disguised gpg-agentd process, leveraged cron jobs to download malicious scripts, abused Redis for persistence, and used masscan for rapid scanning, followed by practical security recommendations to harden servers and Redis instances.

Cron Jobsgpg-agentdmalware analysis
0 likes · 14 min read
How a Hidden gpg-agentd Process Hijacked a CentOS Server and Spread via Redis and Masscan
Efficient Ops
Efficient Ops
May 20, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server

After a routine morning, the author discovers an Alibaba Cloud server frozen due to malicious outbound traffic, then traces a sophisticated malware chain involving a disguised gpg-agentd process, malicious cron jobs, compromised SSH keys, Redis exploitation, and mass scanning, culminating in detailed forensic analysis and security recommendations.

Cron JobsSSH Securitygpg-agentd
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server