Frequently Asked Questions about some suggestions for securing your Unix machine after it has already been compromised.
This FAQ about some suggestions for securing your Unix machine after it has already been compromised was compiled and written by Christopher Klaus firstname.lastname@example.org with numerous contributions by others.
Thanks to the following people for adding and shaping this FAQ:
Tomasz Surmacz email@example.com
Wes Morgan (firstname.lastname@example.org)
Alan Hannan (email@example.com)
Peter Van Epp firstname.lastname@example.org
Richard Jones email@example.com
Wieste Venema firstname.lastname@example.org
Adrian Rodriguez email@example.com
Jill Bowyer firstname.lastname@example.org
Andy Mell email@example.com
This paper is Copyright (c) 1994, 1995, 1996
by Christopher Klaus of Internet Security Systems, Inc.
Permission is hereby granted to give away free copies electronically. You may distribute, transfer, or spread this paper electronically. You may not pretend that you wrote it. This copyright notice must be maintained in any copy made. If you wish to reprint the whole or any part of this paper in any other medium excluding electronic medium, please ask the author for permission.