This is a read-only archive. Find the latest Linux articles, documentation, and answers at the new Linux.com!

Linux.com

Checksum or not..

Posted by: Anonymous [ip: 68.47.230.235] on January 25, 2008 05:56 AM
I understand that md5sums can be used to determine file modifcations, and yes you could configure any HIDS system to do that for you, but the question at this point is how does the intrusion occur? That's what people want to know.

#

Return to Mystery infestation strikes Linux/Apache Web sites