Mar 252013

Article by Jay Turla first published on infosecinstitute

A lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used by malicious attackers after successfully pawning a certain server or any live network in order to maintain their access, elevate their access privilege, and spy other users in a network. In order to protect our network or server from such intrusions and further damage, there are free and open source detection tools that can be deployed and used as part of our security strategy. They are mandatory when our server or network is up and running, especially if a certain user is downloading a file which could possibly be malicious or harmful.

The advantage of using free and open source detection tools is that you obviously don’t need to pay a single penny and that tutorials are very easy to get and understand because manuals are included which are usually named as README so be sure to RTFM (Read the F****** Manual).

Here are some tools which could be of use to you guys
Continue reading »

flattr this!

Jan 252011

tux-polHow to use Rkhunter, Chkrootkit, ClamAV, Afick

This is the second part of the article wrote by Angelo Fonseca on his blog.

Angelo it’s a Linux systema administrator expert in security issues, he’s also the founder of Linkedin group “GNU/Linux Security & Hardening”

I found it really interesting and so i’m really glad to propose this to all of you.


In my previous post I talk about “File Integrity Checkers” and “Rootkit Revealers” for GNU/Linux.
Today, I’ll explain you how to “pratically” install and use them for checking your system and reveal security problems.

Read the full article here

flattr this!