亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? faq

?? 在網(wǎng)絡(luò)安全中經(jīng)常會(huì)遇到rootkit
??
?? 第 1 頁 / 共 2 頁
字號(hào):
ROOTKIT HUNTER FREQUENTLY ASKED QUESTIONS (FAQ)===============================================The latest version of this FAQ can be found at the RKH web site.(http://sourceforge.net/docman/?group_id=155034)=========================================================== 1. GENERAL QUESTIONS   1.1) What is Rootkit Hunter?   1.2) What are rootkits?   1.3) Can I help with the development of this project?   1.4) I like your software! How can I thank you? 2. INSTALLATION QUESTIONS   2.1) How do I install Rootkit Hunter?   2.2) How do I create a Rootkit Hunter RPM file? 3. USAGE QUESTIONS   3.1) Rootkit Hunter tells me there is something wrong with        my system. What do I do?   3.2) Rootkit Hunter tells me that I have vulnerable applications        installed. But I have fully patched my server! How is this        possible?   3.3) How can I automatically run Rootkit Hunter every day?   3.4) What is the meaning of the test names?   3.5) Can rkhunter handle filenames with spaces in them?   3.6) What does the following warning mean:          Determining OS... Warning: this operating system is not          fully supported!   3.7) I have just installed Rootkit Hunter, and I am already        getting warning messages. Why is that?   3.8) When I used the '--propupd' option, Rootkit Hunter told me        I had some missing hashes. What does this mean?   3.9) I run rkhunter in cron and in the emailed output I get some        strange characters. Why is this? 4. ERROR AND WARNING MESSAGES   4.1) What does the following warning mean:          The file of stored file properties (rkhunter.dat) is empty,          and so must be created. To do this type in          'rkhunter --propupd'.   4.2) Rootkit Hunter skips some checks, and the logfile indicates        that certain commands are missing. What can I do?   4.3) I get warnings from PHP like:          PHP Warning: Function registration failed - duplicate name          - pg_update in Unknown on line 0. What does this mean?   4.4) After performing some updates, all, or some, binaries in the        file properties checks are marked with a 'Warning'.        What can I do? 5. UPDATING QUESTIONS   5.1) Rootkit Hunter tells me that I have multiple versions        installed. How it this possible?   5.2) Can I be notified when a new release will be available?===========================================================1. GENERAL QUESTIONS====================1.1) What is Rootkit Hunter?A.   Rootkit Hunter (RKH) is an easy-to-use tool which checks     computers running UNIX (clones) for the presence of rootkits     and other unwanted tools.1.2) What are rootkits?A.   Most times they are self-hiding toolkits used by blackhats,     crackers and scriptkiddies, to avoid the eye of the sysadmin.1.3) Can I help with the development of this project?A.   Yes, everyone can help in some way. For example:     Help your fellow Rootkit Hunter users on the rkhunter-users     mailing list;     Send a copy of an undetected rootkit to us so that it can     be added and help others;     Translate RKH messages to your native language. For the     template see the standard language file i18n/en.     Are you a package maintainer? If so, then please submit     your changes to us so that everyone can benefit from them;     Are you an end-user? FOSS, and hence RKH, ultimately depends     upon you. Contributing is your responsibility, not someone     elses. Whatever you contribute is very much welcomed. For     example, contribute or discuss enhancing Rootkit Hunter with     us; submit a patch or discuss enhancements; file a bug     report; or test the application by using it on your servers.1.4) I like your software! How can I thank you?A.   Simple - by contributing. See question 1.3 above.===========================================================2. INSTALLATION QUESTIONS=========================2.1) How do I install Rootkit Hunter?A.   Instructions on installing RKH can be found in the README file.2.2) How do I create a Rootkit Hunter RPM file?A.   The RKH source contains an rkhunter.spec file which will     allow an RPM to be built. To build the RPM run the following     command:            rpmbuild -ta rkhunter-<version>.tar.gz     The last part of the displayed build process should indicate     where the RPM file has been written. However, it will usually     be found in '/usr/src/redhat/RPMS/noarch'.     NOTE: The RKH development team do not support any third-party     RPM files. However, the rkhunter.spec file will be maintained. ===========================================================3. USAGE QUESTIONS==================3.1) Rootkit Hunter tells me there is something wrong with my     system. What do I do?A.   Prior to any incident it is recommended that you have read     "Intruder Detection Checklist". This is available from     http://www.cert.org/tech_tips/intruder_detection_checklist.html     This document will tell you what to check, and makes it easier     for you to find out and answer any questions.     If you are unsure as to whether your system is compromised,     you can get a second opinion from sources such as the     rkhunter-users mailing list, the Linux-oriented forum     LinuxQuestions.org, or even IRC. Please note you need to      subscribe before posting to the rkhunter-users mailing list.     If a file property check fails, then it is possible you have     what is called a 'false positive'. Sometimes this will happen     due to package updates, customised configurations or changed     binaries. If so, then please check further:       1. If you run a file integrity checker, for example Aide,          Samhain, or tripwire, consult the results from running those          tools. Note they must be installed directly after the O/S          installation in order to be useful, and you must keep a copy          of the binary, configuration files and databases off-site.          Also note that running those tools, and Rootkit Hunter, is no          substitute for updating software when updates are released,          and proper host and network hardening.       2. If you don't run a file integrity checker you can possibly          use your distributions package management system if it is          configured to deal with verification.       3. Run 'strings <file>' and check the results for untrusted file          paths (for example, /dev/.hiddendir).       4. Check recently updated binaries and their original source.       5. Run 'file <file>' and compare the results with other files,          especially trusted binaries. If some binaries are statically          linked and others are all dynamic, then they could have been          trojaned.     If you have a warning from another part of the checks, then     please subscribe first and then email the rkhunter-users mailing list     and tell us about your system configuration:        the purpose of the server (for example, web server, intranet        fileserver, shell server);        the (aproximate) date of the incident and when you found out;        the running distribution name, release and kernel version;        whether any passwd/shadow file data has changed;        any anomalies you find from reading the system, daemon, IDS        and firewall logs;        if all the installed software was recently updated;        what services are or were running at the time;        if you found setuid root files in directories for temporary        files;        any anomalies you find from reading user shell histories.     If your system is infected with a rootkit, cleaning it up is     not an option. Restoring is also not an option unless you are     skilled, and have autonomous and an independent means of     verifying that the backup is clean, and does not contain     misconfigured or stale software. Never trust a compromised     machine. Period.     Read "Steps for Recovering from a UNIX or NT System Compromise".     This is available from     http://www.cert.org/tech_tips/root_compromise.html     A clean install of the system is recommended after backing up     the full system. To do this follow these steps:       1. Stay calm. Be methodical.       2. From another machine inform users, and the network,          facility or host owner, that the machine is compromised.       3. Get the host offline or make sure the firewall is raised          to only allow network traffic to and from your management          IP address or range.       4. Backup your data. If you do not intend to investigate the          problem, then do not backup any binaries or binary data          which you cannot verify.       5. Verify the integrity of your backup by visual inspection          (authentication data, configurations, log files), or by          using a file integrity checker or your distributions          package management tools.       6. Install your host with a fresh install. Whilst you are          updating and configuring the software and services,          restrict network access to the system using authentication          features like accounts, PAM, firewall, TCP wrappers, and          daemon configurations. Make sure you properly harden the          machine.       7. Investigate the old log files, and the tools used if          possible. Also investigate the services which were          vulnerable at the time of attack.3.2) Rootkit Hunter tells me that I have an out-of-date or unsecure     application installed. But I have fully patched my server!     How is this possible?A.   Some distributions, for example Red Hat and OpenBSD, do patch     old versions of software. However, Rootkit Hunter thinks it is     an old version, and so sees it as being unsecure.     It is possible to whitelist specific applications, or specific     versions of an application. The configuration file contains more     details about this.     If you wish you can skip the application version check completely     by adding the 'apps' test name to the DISABLE_TESTS option in your     rkhunter.conf configuration file.3.3) How can I automatically run Rootkit Hunter every day?A.   There are several ways that rkhunter can be run via cron. However,     it must be remembered that cron will automatically email any output     produced by the program to the root user. Secondly, when the rkhunter     '--cronjob' option is used, the program will generally not produce     any output. It is, therefore, necessary to tell rkhunter what output     should be shown. Typically this will just be any warning messages,     and this can be achieved by using the '--rwo' (report warnings only)     option.     For the first example, the rkhunter command could be added directly     to the root crontab:          30 5 * * * /usr/local/bin/rkhunter --cronjob --update --rwo     This would run rkhunter at 5:30 (AM) every day. If no output is     produced by rkhunter, then nothing is emailed to root. Any output     this is produced, which would only be warning messages, is

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
www日韩大片| 91精品在线观看入口| 欧美激情艳妇裸体舞| 成人av午夜电影| 亚洲电影一级黄| 欧美日韩亚洲另类| 国产精品123| 亚洲一二三专区| 久久人人爽爽爽人久久久| 99久久久免费精品国产一区二区| 亚洲成在人线在线播放| 久久人人爽人人爽| 欧美视频日韩视频| 久久成人久久爱| 亚洲欧美另类小说| 日韩欧美资源站| 色综合天天性综合| 久久99精品国产91久久来源| 亚洲女与黑人做爰| www国产成人免费观看视频 深夜成人网| 成人精品国产免费网站| 肉丝袜脚交视频一区二区| 欧美国产精品久久| 日韩一区二区在线播放| 色视频成人在线观看免| 国内精品嫩模私拍在线| 亚洲电影在线播放| 国产精品电影院| 欧美精品一区男女天堂| 欧美绝品在线观看成人午夜影视| 国产电影一区二区三区| 蜜臀a∨国产成人精品| 亚洲一区二区三区四区不卡| 国产日本欧美一区二区| 精品国产髙清在线看国产毛片| 欧日韩精品视频| www.av亚洲| 成人国产精品免费网站| 国产在线视频一区二区三区| 五月天国产精品| 一区二区三区在线不卡| 中文字幕一区二区三区不卡在线| 91精品在线麻豆| 欧美剧情片在线观看| 色狠狠综合天天综合综合| 成人午夜伦理影院| 精品一区免费av| 久久激情五月激情| 日韩电影免费一区| 日本亚洲最大的色成网站www| 一区在线中文字幕| 中文无字幕一区二区三区| 久久精品亚洲乱码伦伦中文| 欧美一区二区日韩| 日韩一区二区影院| 欧美成人三级在线| 精品久久免费看| 在线成人免费观看| 欧美精品粉嫩高潮一区二区| 欧美视频在线播放| 91.麻豆视频| 欧美一级精品在线| 欧美日韩国产三级| 日韩一二三四区| 精品入口麻豆88视频| 欧美成人精品高清在线播放| 欧美三级在线看| 欧美日韩视频一区二区| 欧美精品黑人性xxxx| 欧美日韩国产在线观看| 欧美一区二区网站| 久久只精品国产| 中文av一区二区| 婷婷成人激情在线网| 国产精品亚洲а∨天堂免在线| 99久久国产综合色|国产精品| 欧美视频你懂的| 国产日韩欧美激情| 亚洲最大色网站| 国产福利精品一区二区| 欧美做爰猛烈大尺度电影无法无天| 欧美一三区三区四区免费在线看 | 91社区在线播放| 日韩亚洲欧美在线| 亚洲天堂av一区| 美女视频免费一区| 91无套直看片红桃| 日韩视频一区在线观看| 国产精品的网站| 老色鬼精品视频在线观看播放| 99视频一区二区三区| 日韩一区二区三区av| 亚洲人成小说网站色在线 | 日本特黄久久久高潮| 成人免费高清视频在线观看| 欧美日产国产精品| 国产精品美女www爽爽爽| 日本成人超碰在线观看| 色香蕉成人二区免费| 国产亚洲精品久| 麻豆91精品91久久久的内涵| 日本道色综合久久| 国产欧美精品国产国产专区| 日韩电影在线看| 在线观看亚洲a| 《视频一区视频二区| 国产精品一区二区在线播放| 欧美一区二区播放| 亚洲午夜电影网| 91蜜桃视频在线| 中国av一区二区三区| 国产一区 二区| 欧美哺乳videos| 奇米影视一区二区三区小说| 欧洲av在线精品| 一区二区三区在线视频观看58| 国产成人啪免费观看软件| 91麻豆精品国产无毒不卡在线观看| 亚洲最大成人网4388xx| 99精品桃花视频在线观看| 国产精品久久久久桃色tv| 国产一区二区h| 久久久久久久久97黄色工厂| 久久国产夜色精品鲁鲁99| 91精品国产综合久久蜜臀| 午夜一区二区三区视频| 欧美日韩一区二区三区视频| 一区二区三区蜜桃网| 欧洲生活片亚洲生活在线观看| 亚洲男人都懂的| 在线观看一区二区视频| 一区二区三区四区激情| 在线看一区二区| 亚洲电影一区二区三区| 欧美精品九九99久久| 日韩 欧美一区二区三区| 欧美一区二区三区色| 免费在线视频一区| 精品国产髙清在线看国产毛片 | 色一区在线观看| 一区二区在线免费观看| 日本韩国欧美一区二区三区| 一区二区免费视频| 欧美人牲a欧美精品| 日韩国产精品大片| 日韩手机在线导航| 国内精品国产三级国产a久久| 2020日本不卡一区二区视频| 国产精品一区二区91| 国产欧美久久久精品影院| 成人午夜免费视频| 亚洲精品高清在线观看| 欧美日韩1234| 韩国一区二区三区| 国产精品理论在线观看| 色呦呦日韩精品| 日本中文字幕一区二区视频| 精品人在线二区三区| 成人午夜在线播放| 亚洲国产精品一区二区www在线| 欧美精品日韩一区| 国产精品1024久久| 亚洲综合偷拍欧美一区色| 这里是久久伊人| 大桥未久av一区二区三区中文| 亚洲欧美日韩电影| 日韩一卡二卡三卡国产欧美| 国产一区二区在线免费观看| 中文字幕一区av| 欧美一区二区免费视频| 成人激情校园春色| 日韩精品一二三| 国产精品久久毛片a| 91精品久久久久久久99蜜桃| 国产 欧美在线| 香蕉加勒比综合久久| 国产女主播一区| 欧美日韩国产bt| 成人精品在线视频观看| 亚洲va欧美va天堂v国产综合| 欧美变态tickle挠乳网站| 色婷婷精品大视频在线蜜桃视频| 日韩福利视频导航| 国产精品久久久久9999吃药| 欧美另类一区二区三区| 成人免费毛片a| 免费一级片91| 亚洲免费色视频| 精品福利一区二区三区免费视频| youjizz国产精品| 国内外精品视频| 亚洲成av人影院| 亚洲丝袜美腿综合| 久久先锋影音av| 欧美日韩成人在线一区| 91免费在线看| 粉嫩蜜臀av国产精品网站| 日本不卡视频在线| 亚洲一区在线电影| 亚洲欧洲www|