Last change: 2025-01-06
Learn how to determine the details of most types of files on Linux, together with the understanding how these tools do their job.
Last change: 2025-01-06
Learn how to determine the details of most types of files on Linux, together with the understanding how these tools do their job.
Last change: 2025-01-06
Linux rootkits are malicious components to maintain unauthorized access. In this article about intrusion detection we have a look at rootkits and detection.
Last change: 2025-01-06
Guide for auditing Linux systems by using the audit daemon and related utilities. This powerful audit framework has many possibilities for auditing Linux.
Last change: 2025-01-06
Is your Linux system compromised or does it run suspicious processes? Learn how to investigate the system and create an action plan.