Hi Reuben > 2. Run several rootkit detection. Rookit hunter (http://www.rootkit.nl/) > and chkrootkit (http://www.chkrootkit.org/) are two commons program for > rootkit detection. Have now used therootkit as well... Impressive!! This is one of the items it came up with... How do I change SSH so that access directly as root is NOT allowed? * Check: SSH Searching for sshd_config... Found /etc/ssh/sshd_config Checking for allowed root login... Watch out Root login possible. Possible risk! Regards Chris -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list