亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? faq

?? 在網絡安全中經常會遇到rootkit
??
?? 第 1 頁 / 共 2 頁
字號:
ROOTKIT HUNTER FREQUENTLY ASKED QUESTIONS (FAQ)===============================================The latest version of this FAQ can be found at the RKH web site.(http://sourceforge.net/docman/?group_id=155034)=========================================================== 1. GENERAL QUESTIONS   1.1) What is Rootkit Hunter?   1.2) What are rootkits?   1.3) Can I help with the development of this project?   1.4) I like your software! How can I thank you? 2. INSTALLATION QUESTIONS   2.1) How do I install Rootkit Hunter?   2.2) How do I create a Rootkit Hunter RPM file? 3. USAGE QUESTIONS   3.1) Rootkit Hunter tells me there is something wrong with        my system. What do I do?   3.2) Rootkit Hunter tells me that I have vulnerable applications        installed. But I have fully patched my server! How is this        possible?   3.3) How can I automatically run Rootkit Hunter every day?   3.4) What is the meaning of the test names?   3.5) Can rkhunter handle filenames with spaces in them?   3.6) What does the following warning mean:          Determining OS... Warning: this operating system is not          fully supported!   3.7) I have just installed Rootkit Hunter, and I am already        getting warning messages. Why is that?   3.8) When I used the '--propupd' option, Rootkit Hunter told me        I had some missing hashes. What does this mean?   3.9) I run rkhunter in cron and in the emailed output I get some        strange characters. Why is this? 4. ERROR AND WARNING MESSAGES   4.1) What does the following warning mean:          The file of stored file properties (rkhunter.dat) is empty,          and so must be created. To do this type in          'rkhunter --propupd'.   4.2) Rootkit Hunter skips some checks, and the logfile indicates        that certain commands are missing. What can I do?   4.3) I get warnings from PHP like:          PHP Warning: Function registration failed - duplicate name          - pg_update in Unknown on line 0. What does this mean?   4.4) After performing some updates, all, or some, binaries in the        file properties checks are marked with a 'Warning'.        What can I do? 5. UPDATING QUESTIONS   5.1) Rootkit Hunter tells me that I have multiple versions        installed. How it this possible?   5.2) Can I be notified when a new release will be available?===========================================================1. GENERAL QUESTIONS====================1.1) What is Rootkit Hunter?A.   Rootkit Hunter (RKH) is an easy-to-use tool which checks     computers running UNIX (clones) for the presence of rootkits     and other unwanted tools.1.2) What are rootkits?A.   Most times they are self-hiding toolkits used by blackhats,     crackers and scriptkiddies, to avoid the eye of the sysadmin.1.3) Can I help with the development of this project?A.   Yes, everyone can help in some way. For example:     Help your fellow Rootkit Hunter users on the rkhunter-users     mailing list;     Send a copy of an undetected rootkit to us so that it can     be added and help others;     Translate RKH messages to your native language. For the     template see the standard language file i18n/en.     Are you a package maintainer? If so, then please submit     your changes to us so that everyone can benefit from them;     Are you an end-user? FOSS, and hence RKH, ultimately depends     upon you. Contributing is your responsibility, not someone     elses. Whatever you contribute is very much welcomed. For     example, contribute or discuss enhancing Rootkit Hunter with     us; submit a patch or discuss enhancements; file a bug     report; or test the application by using it on your servers.1.4) I like your software! How can I thank you?A.   Simple - by contributing. See question 1.3 above.===========================================================2. INSTALLATION QUESTIONS=========================2.1) How do I install Rootkit Hunter?A.   Instructions on installing RKH can be found in the README file.2.2) How do I create a Rootkit Hunter RPM file?A.   The RKH source contains an rkhunter.spec file which will     allow an RPM to be built. To build the RPM run the following     command:            rpmbuild -ta rkhunter-<version>.tar.gz     The last part of the displayed build process should indicate     where the RPM file has been written. However, it will usually     be found in '/usr/src/redhat/RPMS/noarch'.     NOTE: The RKH development team do not support any third-party     RPM files. However, the rkhunter.spec file will be maintained. ===========================================================3. USAGE QUESTIONS==================3.1) Rootkit Hunter tells me there is something wrong with my     system. What do I do?A.   Prior to any incident it is recommended that you have read     "Intruder Detection Checklist". This is available from     http://www.cert.org/tech_tips/intruder_detection_checklist.html     This document will tell you what to check, and makes it easier     for you to find out and answer any questions.     If you are unsure as to whether your system is compromised,     you can get a second opinion from sources such as the     rkhunter-users mailing list, the Linux-oriented forum     LinuxQuestions.org, or even IRC. Please note you need to      subscribe before posting to the rkhunter-users mailing list.     If a file property check fails, then it is possible you have     what is called a 'false positive'. Sometimes this will happen     due to package updates, customised configurations or changed     binaries. If so, then please check further:       1. If you run a file integrity checker, for example Aide,          Samhain, or tripwire, consult the results from running those          tools. Note they must be installed directly after the O/S          installation in order to be useful, and you must keep a copy          of the binary, configuration files and databases off-site.          Also note that running those tools, and Rootkit Hunter, is no          substitute for updating software when updates are released,          and proper host and network hardening.       2. If you don't run a file integrity checker you can possibly          use your distributions package management system if it is          configured to deal with verification.       3. Run 'strings <file>' and check the results for untrusted file          paths (for example, /dev/.hiddendir).       4. Check recently updated binaries and their original source.       5. Run 'file <file>' and compare the results with other files,          especially trusted binaries. If some binaries are statically          linked and others are all dynamic, then they could have been          trojaned.     If you have a warning from another part of the checks, then     please subscribe first and then email the rkhunter-users mailing list     and tell us about your system configuration:        the purpose of the server (for example, web server, intranet        fileserver, shell server);        the (aproximate) date of the incident and when you found out;        the running distribution name, release and kernel version;        whether any passwd/shadow file data has changed;        any anomalies you find from reading the system, daemon, IDS        and firewall logs;        if all the installed software was recently updated;        what services are or were running at the time;        if you found setuid root files in directories for temporary        files;        any anomalies you find from reading user shell histories.     If your system is infected with a rootkit, cleaning it up is     not an option. Restoring is also not an option unless you are     skilled, and have autonomous and an independent means of     verifying that the backup is clean, and does not contain     misconfigured or stale software. Never trust a compromised     machine. Period.     Read "Steps for Recovering from a UNIX or NT System Compromise".     This is available from     http://www.cert.org/tech_tips/root_compromise.html     A clean install of the system is recommended after backing up     the full system. To do this follow these steps:       1. Stay calm. Be methodical.       2. From another machine inform users, and the network,          facility or host owner, that the machine is compromised.       3. Get the host offline or make sure the firewall is raised          to only allow network traffic to and from your management          IP address or range.       4. Backup your data. If you do not intend to investigate the          problem, then do not backup any binaries or binary data          which you cannot verify.       5. Verify the integrity of your backup by visual inspection          (authentication data, configurations, log files), or by          using a file integrity checker or your distributions          package management tools.       6. Install your host with a fresh install. Whilst you are          updating and configuring the software and services,          restrict network access to the system using authentication          features like accounts, PAM, firewall, TCP wrappers, and          daemon configurations. Make sure you properly harden the          machine.       7. Investigate the old log files, and the tools used if          possible. Also investigate the services which were          vulnerable at the time of attack.3.2) Rootkit Hunter tells me that I have an out-of-date or unsecure     application installed. But I have fully patched my server!     How is this possible?A.   Some distributions, for example Red Hat and OpenBSD, do patch     old versions of software. However, Rootkit Hunter thinks it is     an old version, and so sees it as being unsecure.     It is possible to whitelist specific applications, or specific     versions of an application. The configuration file contains more     details about this.     If you wish you can skip the application version check completely     by adding the 'apps' test name to the DISABLE_TESTS option in your     rkhunter.conf configuration file.3.3) How can I automatically run Rootkit Hunter every day?A.   There are several ways that rkhunter can be run via cron. However,     it must be remembered that cron will automatically email any output     produced by the program to the root user. Secondly, when the rkhunter     '--cronjob' option is used, the program will generally not produce     any output. It is, therefore, necessary to tell rkhunter what output     should be shown. Typically this will just be any warning messages,     and this can be achieved by using the '--rwo' (report warnings only)     option.     For the first example, the rkhunter command could be added directly     to the root crontab:          30 5 * * * /usr/local/bin/rkhunter --cronjob --update --rwo     This would run rkhunter at 5:30 (AM) every day. If no output is     produced by rkhunter, then nothing is emailed to root. Any output     this is produced, which would only be warning messages, is

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产在线精品一区二区| 一区二区三区四区在线| 国产在线麻豆精品观看| 欧美变态口味重另类| 国模少妇一区二区三区| 日本一区二区视频在线观看| 不卡影院免费观看| 亚洲欧美日韩一区二区三区在线观看| 色偷偷88欧美精品久久久| 亚洲线精品一区二区三区八戒| 欧美日韩精品一区二区| 看片网站欧美日韩| 国产精品久久久久毛片软件| 色哟哟日韩精品| 日本va欧美va精品| 国产日韩精品一区| 欧美日韩亚洲不卡| 国精产品一区一区三区mba视频| 亚洲国产精品传媒在线观看| 色久优优欧美色久优优| 日韩高清在线一区| 久久久精品免费免费| 欧美亚洲禁片免费| 国内欧美视频一区二区| 亚洲欧美一区二区三区孕妇| 欧美群妇大交群中文字幕| 国产九九视频一区二区三区| 国产精品伦一区二区三级视频| 欧美三级日本三级少妇99| 韩国av一区二区三区在线观看| 亚洲美女一区二区三区| 欧美成va人片在线观看| 日本电影欧美片| 国产在线乱码一区二区三区| 亚洲第一搞黄网站| 久久久影视传媒| 欧美日本一道本| 波多野结衣视频一区| 美女性感视频久久| 一区二区久久久久久| 久久精品无码一区二区三区| 欧美精品乱码久久久久久 | 国产日产欧美精品一区二区三区| 日本韩国精品一区二区在线观看| 韩国在线一区二区| 日韩精品每日更新| 亚洲日本青草视频在线怡红院| 亚洲精品一区二区三区影院| 欧美影院精品一区| 99re8在线精品视频免费播放| 日本vs亚洲vs韩国一区三区二区| 亚洲综合一二区| 国产精品另类一区| www久久精品| 欧美日韩国产经典色站一区二区三区| 成人国产免费视频| 国内精品久久久久影院薰衣草| 日韩高清在线电影| 偷拍日韩校园综合在线| 一区二区在线观看视频| 中文字幕日韩一区二区| 久久久777精品电影网影网| 欧美一区二区三区影视| 91精品国产综合久久久久| 91国模大尺度私拍在线视频| aaa欧美大片| av在线一区二区三区| 国产91在线看| 不卡一二三区首页| 成人精品亚洲人成在线| 国产91精品在线观看| 国产精品一区二区你懂的| 久久电影国产免费久久电影| 免费欧美日韩国产三级电影| 日韩专区在线视频| 日韩avvvv在线播放| 婷婷综合另类小说色区| 水野朝阳av一区二区三区| 三级在线观看一区二区| 奇米777欧美一区二区| 免费在线看成人av| 黑人精品欧美一区二区蜜桃| 国内精品免费在线观看| 成人一级片网址| 色综合天天性综合| 欧美调教femdomvk| 欧美一区二区三区喷汁尤物| 欧美成人三级在线| 久久精品人人爽人人爽| 国产精品色一区二区三区| 亚洲欧洲www| 亚洲国产精品麻豆| 美腿丝袜亚洲色图| 国产一区二区主播在线| 成人免费不卡视频| 精品视频色一区| 日韩美一区二区三区| 久久麻豆一区二区| 亚洲女人****多毛耸耸8| 亚洲亚洲精品在线观看| 麻豆免费看一区二区三区| 国产不卡高清在线观看视频| 一本一道久久a久久精品综合蜜臀| 欧美日韩三级一区| 日韩午夜av电影| 国产精品剧情在线亚洲| 亚洲午夜电影在线观看| 久久精品国产成人一区二区三区| 福利一区二区在线| 欧美在线三级电影| 久久亚洲欧美国产精品乐播| 自拍偷拍欧美精品| 免费观看30秒视频久久| 成人免费毛片高清视频| 欧美日韩精品电影| 国产欧美日韩三区| 午夜精品在线看| 国产精品一区二区不卡| 欧美性生交片4| 久久午夜国产精品| 亚洲高清在线视频| 成人动漫一区二区三区| 日韩视频一区二区三区在线播放 | 99久久精品国产精品久久| 欧美日韩成人综合| **性色生活片久久毛片| 麻豆极品一区二区三区| 色婷婷精品久久二区二区蜜臀av| 精品入口麻豆88视频| 一区二区在线观看免费视频播放| 国产精品一区免费在线观看| 欧美一区二区三区四区五区| 亚洲免费在线视频一区 二区| 卡一卡二国产精品| 欧美性大战xxxxx久久久| 国产精品妹子av| 国产在线麻豆精品观看| 在线综合视频播放| 亚洲精品亚洲人成人网| 岛国一区二区在线观看| 2欧美一区二区三区在线观看视频| 亚洲国产美国国产综合一区二区 | 色综合激情久久| 欧美国产精品中文字幕| 免费成人av在线| 欧美日韩在线三区| 亚洲综合激情小说| 99re热这里只有精品视频| 欧美激情一区二区三区四区| 久久99日本精品| 日韩亚洲欧美一区| 日韩电影在线观看电影| 欧美三级日韩在线| 一区2区3区在线看| 91女神在线视频| 亚洲天堂网中文字| 91丨porny丨蝌蚪视频| 中文字幕av资源一区| 高清在线不卡av| 国产视频在线观看一区二区三区| 韩国精品一区二区| 久久亚洲春色中文字幕久久久| 另类小说色综合网站| 日韩一级二级三级精品视频| 免费在线观看视频一区| 日韩欧美一区二区视频| 男女男精品网站| 久久久影视传媒| 国产成人精品一区二| 欧美激情一区二区三区四区 | 亚洲一区av在线| 欧美在线你懂得| 五月天一区二区三区| 色老头久久综合| 日韩精品三区四区| 欧美一区二区三区免费大片| 麻豆精品新av中文字幕| 久久亚洲私人国产精品va媚药| 国产69精品一区二区亚洲孕妇| 国产午夜亚洲精品羞羞网站| 99麻豆久久久国产精品免费优播| 亚洲情趣在线观看| 欧美日韩中文字幕精品| 日韩高清不卡一区二区| 欧美成人精品二区三区99精品| 国产乱理伦片在线观看夜一区| 国产日韩av一区| 91丨porny丨中文| 日韩福利电影在线观看| 国产午夜亚洲精品羞羞网站| 99国产精品久久久久久久久久 | 成人精品小蝌蚪| 亚洲综合一区二区三区| 欧美一区二区三区啪啪| 丁香桃色午夜亚洲一区二区三区| 一区二区三区在线观看国产| 91精品国产综合久久精品麻豆 | 波波电影院一区二区三区| 亚洲国产一区二区三区| 精品成人a区在线观看|