Lc.DB — the Linux.com Article Museum
Originally published: Tuesday, 23 May 2000 Author: Alexander Reelsen
Published to: news_enhance_security/Security News Page: 1/1   [Standard view]

Cracked! Part 3: Hunting the Hunter

The third part of a excellent survey on how detect, defend response and react when your machines have been compromised.

(this article had no body text)