Ubuntu installation with the use of a Rootkit scanner

Source: Internet
Author: User
Tags rootkit scanner

Spring Trade Software Studio original article Welcome to Spring trade Software: http://www.svch0st.com/cont.asp?id=39


The recent work has to look at the financial reports. Only in this part, the implementation of the item as many say, this linux is not very easy to poison, but this is not to say that Linux is more powerful, so, can not invade, but because the Linux authority control more rigorous, the general user even if the unfortunate poisoning, The virus will not be able to modify and read the system files due to the lack of appropriate permissions can not play a role, however, if the System Manager's account poisoning, then everything is hard to say, therefore, want to attack the Masters of Linux system, will not use the virus to play, but instead of through the system to obtain the highest authority to invade the way Linux system, and this is the most privileged way to sneak into the system, the way to secretly execute the program, is called "rootkit". As many say, this linux is not very easy to poison, but this is not to say that Linux is more powerful, so, can be hundred poison not invade, but because the Linux authority control more rigorous, the general user even if unfortunately poisoned, The virus will not be able to modify and read the system files due to the lack of appropriate permissions can not play a role, however, if the System Manager's account poisoning, then everything is hard to say, therefore, want to attack the Masters of Linux system, will not use the virus to play, but instead of through the system to obtain the highest authority to invade the way Linux system, and this is the most privileged way to sneak into the system, the way to secretly execute the program, is called "rootkit". On Yahoo, giant Heng Network and other websites



650) this.width=650; "src=" http://s16.sinaimg.cn/mw690/0062Emzcgy6TR9v1bEr7f&690 "width=" "height=" = "image_operate_70921436947662952" alt= "ubuntu <wbr> install with use <wbr>rootkit <wbr> scanner" title= "Ubuntu <wbr> installation and use of <wbr>rootkit <wbr> scanner "style=" margin:0px;padding:0px;border:0px;list-style:none; "/ >


When your computer is a Rootkit, hackers can use this sneak program to control your computer, so your computer is living under the control of others, but usually you will not find, unless your computer becomes a member of the network and is launched to attack others, or, Hackers borrow your computer to do something, to make your computer slow or abnormal phenomenon, so that you have the opportunity to find, if you want to early detection, early treatment, you should regularly use check the Rootkit program to scan!


On Ubuntu, as far as spring trade knows, at least Chkrootkit and Rkhunter (Rootkit Hunter) These two programs can be used, and the installation of these two is very simple, as long as the following apt-get can be installed, but installation Rkhunter , if there is no mail server installed, it will automatically start Postfix to install, installed after the installation of Rkhunter, and also, these two does not seem to automatically add to the menu, so, are to order to execute.


$ sudo apt-get installl chkrootkit


$ sudo apt-get install Rkhunter


After the installation is complete, you can use the following instructions to check, Chkrootkit function is relatively simple, as long as the next instruction can be executed, and rkhunter is more complex, need to have to the parameters will be executed, and, check the project more, but also automatically output log file, and log File storage path is/var/log/rkhunter.log, as to choose that set to use, I was suggested two sets are packed up run well, these two files are not big, run up also don't spend much time, so, all packed to run a run, will be more insurance a bit.


$ sudo chkrootkit


$ sudo rkhunter–check

$ sudo rkhunter--update # Update repository


However, I do not think too much worry will be a RootKit this matter, as long as there is a timely installation of new updates to the newly discovered system to fill up the loopholes, in general, will not be chosen by hackers, because there are so many computers in the world can be invaded, hackers of course, the first choice is easy to invade to attack Luo! Unless there is something important in your computer, it is another matter, or else, is your password is too simple, simple to hackers without a program can guess, this computer will let people feel no need to white!


Spring trade | software Customization | hack | Marketing Software | website design | SOFTWARE Services | data acquisition | Software Design | Research and development | Software Studio | MOBILE Development | protocol Analysis | Android iOS

=========================================================

Spring Trade Software Studio


To undertake small and medium-sized Windows desktop software development, software cracking and reverse. Kernel software development. offline, protocol analysis. Languages used: C + +, C.


To undertake a variety of outsourcing projects, interface development projects. Development of various framework platforms for JAVA, C # language.


Provide solutions to various problems of the system, solve the system crash problem, provide the installation plan.


Official website: www.svch0st.com Contact Q1483187 191968212 Tel 18810615383


=========================================================


This article is from the "Spring Trade software Studio" blog, please be sure to keep this source http://liquan165.blog.51cto.com/1591833/1674980

Ubuntu installation with the use of a Rootkit scanner

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.