RealNews

Detecting Server Compromises

Being hacked is a lot like being haunted–odd things are afoot that you may or may not notice. That said, simple observation is the easiest way to detect when it’s happened. For example, extra users running around your system–from the obvious second superuser root account to the “sneaky john” account that you never created–are easy to spot if you’re keeping an eye on things. You might also observe file changes that you never made, or programs running that you never started–such as a sniffer, an IRC program or a file-sharing program. Full Story

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.