Originally Published: Tuesday, 23 May 2000 Author: Alexander Reelsen
Published to: news_enhance_security/Security News Page: 1/1 - [Printable]

Cracked! Part 3: Hunting the Hunter

The third part of a excellent survey on how detect, defend response and react when your machines have been compromised.