debian.org compromise - Developer Cleanup Info

    Date09 Dec 2003
    3112
    Posted ByAnthony Pell
    Though specifically for Debian developers who might have been hacked, this document contains excellent information for anyone who needs to verify the security of a linux install after a possible compromise.. . . Though specifically for Debian developers who might have been hacked, this document contains excellent information for anyone who needs to verify the security of a linux install after a possible compromise.

    Of course, after a known compromise, a best defensive practice is to make an immediate disk-image for forensic purposes, and then wipe everything out and start again, with new passwords and keys.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"7","type":"x","order":"1","pct":87.5,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.