It's strongly recommend that operating systems of infected machines be completely reinstalled.
The question that is not answered is what a user should do if they are compromised.On Fri, Mar 21, 2014 at 2:29 PM, Thuo Wilson <lixton@gmail.com> wrote:
On 21 March 2014 14:02, Brian Echesa <bechesa@gmail.com> wrote:
Interesting ..ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected"
Whats the -G option for ? on my ssh version its not theresame as "-g".Kind Regards,Wilson./_______________________________________________
skunkworks mailing list
skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke
--RegardsBrian Ngure
_______________________________________________
skunkworks mailing list
skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke