MaGe Linux Operations
Jan 12, 2018 · Information Security
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks
This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.
Network Monitoringintrusion detectionkernel integrity
0 likes · 14 min read
