|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Tuesday, 23 May 2000||Author: Alexander Reelsen|
|Published to: news_enhance_security/Security News||Page: 1/1 - [Printable]|
Cracked! Part 3: Hunting the Hunter
The third part of a excellent survey on how detect, defend response and react when your machines have been compromised.