The question that is not answered is what a user should do if they are compromised.


On Fri, Mar 21, 2014 at 2:29 PM, Thuo Wilson <lixton@gmail.com> wrote:

On 21 March 2014 14:02, Brian Echesa <bechesa@gmail.com> wrote:
Interesting ..
ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected"

Whats the -G option for ? on my ssh version its not there

same as "-g".


Kind Regards,
Wilson./

_______________________________________________
skunkworks mailing list
skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------

Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke



--
Regards

Brian Ngure