OnWorks Linux and Windows Online WorkStations

Logo

Free Hosting Online for WorkStations

< Previous | Contents | Next >

• When using a non-permanent Internet connection, shut it down as soon as you don't need it anymore.

• Run private services on odd ports instead of the ones expected by possible hackers.

• Know your system. After a while, you can almost feel when something is happening.


image

10.5.7. Have I been hacked?


How can you tell? This is a checklist of suspicious events:


• Mysterious open ports, strange processes.

• System utilities (common commands) behaving strange.

• Login problems.

• Unexplained bandwidth usage.

• Damaged or missing log files, syslog daemon behaving strange.

• Interfaces in unusual modes.

• Unexpectedly modified configuration files.

• Strange entries in shell history files.

• Unidentified temporary files.


image


Top OS Cloud Computing at OnWorks: