Full Disclosure mailing list archives
Re: White Paper: Detecting System Intrusions
From: Valdis.Kletnieks () vt edu
Date: Fri, 18 Jan 2013 15:21:42 -0500
On Wed, 16 Jan 2013 12:39:18 -0500, Almaz said:
How to detect system intrusions? What are the techniques? Can one character difference in the output be an indicator of compromise?
Paging Cliff Stoll.. Cliff Stoll to the courtesy phone...
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- White Paper: Detecting System Intrusions Almaz (Jan 16)
- Re: White Paper: Detecting System Intrusions Andrew Terekhov (Jan 17)
- Re: White Paper: Detecting System Intrusions Źmicier Januszkiewicz (Jan 17)
- Re: White Paper: Detecting System Intrusions Ulisses Montenegro (Jan 17)
- Re: White Paper: Detecting System Intrusions Źmicier Januszkiewicz (Jan 17)
- Re: White Paper: Detecting System Intrusions Valdis . Kletnieks (Jan 18)
- Re: White Paper: Detecting System Intrusions Jeffrey Walton (Jan 18)
- Re: White Paper: Detecting System Intrusions Andrew Terekhov (Jan 17)