Linux POCKET REFERENCE GUIDE

On a periodic basis (daily, weekly, or each time you logon to a system you manage,) run through these quick steps to look for anomalous behavior that might be caused by a computer intrusion. Each of these commands runs locally on a system.
This sheet is split into these sections:
• Unusual Processes and Services
• Unusual Files
• Unusual Network Usage
• Unusual Scheduled Tasks
• Unusual Accounts
• Unusual Log Entries
• Other Unusual Items
• Additional Supporting Tools

linux-cheat-sheet

Leave a Reply

Your email address will not be published. Required fields are marked *