Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ssh checksum error



"Patrick R. McManus" wrote:

> [Derek D. Martin: Tue, Apr 30, 2002 at 11:55:25PM -0400]
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Off list, someone asked me:
> > > Two questions:
> > >
> > > 1. Are there security tools that will tell if my machine has been
> > > owned?
> >
> > Yes, but they generally require that you use them BEFORE there's any
> > possibility of your system being compromised (i.e. before it's been
>
> I've found chkrootkit (http://www.chkrootkit.org/) helpful after the
> fact. Negative reports (not cracked) are, of course, not to be
> trusted in any install-after-the-fact pacakges, but I like how it will
> give a quick positive to confirm any suspicions for most common cases.
>
> -P
>
> _______________________________________________
> Discuss mailing list
> Discuss at blu.org
> http://www.blu.org/mailman/listinfo/discuss

I just ran it: it looks OK, accept for a warning about a "suspicious" file
in the perl5 directory chain: ".packlist"

I've copied the file to my html directory: please examine it and tell me
what looks suspicious. TIA.

http://billhorne.homelinux.org/packlist

Bill



--
Bill Horne
PGP key: http://pgp.dtype.org:11371/pks/lookup?op=get&search=0xB1D7BB90






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org