
<quote> It's strongly recommend that operating systems of infected machines be completely reinstalled. </quote> On Fri, Mar 21, 2014 at 2:33 PM, Brian Ngure <brian@pixie.co.ke> wrote:
The question that is not answered is what a user should do if they are compromised.
On Fri, Mar 21, 2014 at 2:29 PM, Thuo Wilson <lixton@gmail.com> wrote:
On 21 March 2014 14:02, Brian Echesa <bechesa@gmail.com> wrote:
Interesting .. *ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected"*
Whats the -G option for ? on my ssh version its not there
same as "-g".
Kind Regards, Wilson./
_______________________________________________ skunkworks mailing list skunkworks@lists.my.co.ke ------------ List info, subscribe/unsubscribe http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------
Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Regards
Brian Ngure
_______________________________________________ skunkworks mailing list skunkworks@lists.my.co.ke ------------ List info, subscribe/unsubscribe http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------
Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke