Tagged articles
8 articles
Page 1 of 1
Ops Community
Ops Community
May 4, 2026 · Information Security

Investigating and Securing a Server After a Suspicious Login

When a production server shows unexpected high CPU usage and unknown login activity, this guide walks Linux ops engineers through confirming intrusion, stopping the attacker, tracing the attack path, removing backdoors, restoring system integrity, and applying hardening measures to prevent future breaches.

ForensicsHardeningLinux
0 likes · 27 min read
Investigating and Securing a Server After a Suspicious Login
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Can You Trust ps, netstat, and ss on a Compromised Linux Host? Meet LinIR

The article examines why traditional Linux commands like ps, netstat, and ss cannot be trusted on a potentially root‑kit‑infected system, introduces the LinIR tool that collects forensic data without relying on the host's user‑space toolchain, and compares it against manual scripts, other automation tools, and commercial EDR solutions.

GoLinIRLinux incident response
0 likes · 14 min read
Can You Trust ps, netstat, and ss on a Compromised Linux Host? Meet LinIR
Open Source Linux
Open Source Linux
Apr 19, 2022 · Information Security

Ultimate Linux Server Security Checklist: Harden Accounts, Detect Rootkits, and Respond to Attacks

This comprehensive guide walks you through Linux server hardening—covering account and login security, remote access safeguards, file system protection, rootkit detection tools, and step‑by‑step incident response—to help you prevent breaches and recover swiftly if an attack occurs.

File PermissionsLinuxRootkit Detection
0 likes · 24 min read
Ultimate Linux Server Security Checklist: Harden Accounts, Detect Rootkits, and Respond to Attacks
Refining Core Development Skills
Refining Core Development Skills
Jan 28, 2022 · Information Security

Detecting a Hidden Mining Virus in a Linux System: A Narrative

A dramatized Linux security incident shows how administrators use commands like top, ps, netstat, and the unhide tool to discover hidden mining processes, isolate suspicious network connections, and finally terminate the malicious hidden PID, illustrating practical techniques for rootkit detection and response.

LinuxRootkit DetectionSecurity
0 likes · 7 min read
Detecting a Hidden Mining Virus in a Linux System: A Narrative
MaGe Linux Operations
MaGe Linux Operations
Nov 3, 2019 · Information Security

Essential Linux Security Hardening: From Account Safety to Rootkit Detection

This comprehensive guide walks operations engineers through Linux security hardening—covering account and login protection, service minimization, password and key authentication, proper use of su/sudo, banner trimming, remote access safeguards, file system security, rootkit detection tools, and step‑by‑step post‑attack response—to build resilient servers against modern threats.

Rootkit DetectionSystem Hardeninginformation security
0 likes · 24 min read
Essential Linux Security Hardening: From Account Safety to Rootkit Detection
MaGe Linux Operations
MaGe Linux Operations
Jul 20, 2017 · Information Security

Essential Linux Security Hardening: From Account Safety to Rootkit Detection

This guide outlines comprehensive Linux security practices for administrators, covering account and login protection, service minimization, password and key authentication, sudo usage, system welcome message hardening, remote access safeguards, filesystem permissions, rootkit detection tools, and step‑by‑step response procedures after a server compromise.

Linux securityRootkit Detectionincident response
0 likes · 25 min read
Essential Linux Security Hardening: From Account Safety to Rootkit Detection