| 
View
 

IntrusionEvidence

Page history last edited by Patrick 2 years ago

 

Overview

  • How do you know if there's been an intrusion on your network? It's not an easy task to identify all of the evidence that might point to an intrusion. In these videos I describe sources of information that can be used to identify whether a Linux system has been victim to an intrusion. Note that the same principles apply to any system, only the location of the evidence will be different.

 

Videos

 

 

Notes

 

External Readings

 

 

Comments (0)

You don't have permission to comment on this page.