Frequently Asked Questions about some suggestions for securing your Unix machine after it has already been compromised.
This FAQ about some suggestions for securing your Unix machine after it has already been compromised was compiled and written by Christopher Klaus email@example.com with numerous contributions by others.
Thanks to the following people for adding and shaping this FAQ:
Tomasz Surmacz firstname.lastname@example.org
Wes Morgan (email@example.com)
Alan Hannan (firstname.lastname@example.org)
Peter Van Epp email@example.com
Richard Jones firstname.lastname@example.org
Wieste Venema email@example.com
Adrian Rodriguez firstname.lastname@example.org
Jill Bowyer email@example.com
Andy Mell firstname.lastname@example.org
This paper is Copyright (c) 1994, 1995, 1996
by Christopher Klaus of Internet Security Systems, Inc.
Permission is hereby granted to give away free copies electronically. You may distribute, transfer, or spread this paper electronically. You may not pretend that you wrote it. This copyright notice must be maintained in any copy made. If you wish to reprint the whole or any part of this paper in any other medium excluding electronic medium, please ask the author for permission.