Intrusion Detection
How to see the file type?
Learn how to determine the details of most types of files on Linux, together with the understanding how these tools do their job.
Detecting Linux rootkits
Linux rootkits are malicious components to maintain unauthorized access. In this article about intrusion detection we have a look at rootkits and detection.
Configuring and auditing Linux systems with Audit daemon
Guide for auditing Linux systems by using the audit daemon and related utilities. This powerful audit framework has many possibilities for auditing Linux.
How to deal with a compromised Linux system
Is your Linux system compromised or does it run suspicious processes? Learn how to investigate the system and create an action plan.