Linux POCKET REFERENCE GUIDE

On a periodic basis (daily, weekly, or each time you logon to a system you manage,) run through these quick steps to look for anomalous behavior that might be caused by a computer intrusion. Each of these commands runs locally on a system.
This sheet is split into these sections:
• Unusual Processes and Services
• Unusual Files
• Unusual Network Usage
• Unusual Scheduled Tasks
• Unusual Accounts
• Unusual Log Entries
• Other Unusual Items
• Additional Supporting Tools

linux-cheat-sheet

23 comments

  1. Good blog post. A few things i would like to bring up is that computer system memory needs to be purchased should your computer is unable to cope with that which you do along with it. One can put in two good old ram boards of 1GB each, as an illustration, but not certainly one of 1GB and one of 2GB. One should look for the maker’s documentation for own PC to be certain what type of memory space is necessary.

Leave a Reply

Your email address will not be published. Required fields are marked *