RE: Blackhole

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Reuben

> 2. Run several rootkit detection. Rookit hunter (http://www.rootkit.nl/)
> and chkrootkit (http://www.chkrootkit.org/) are two commons program for
> rootkit detection.

Have now used therootkit as well... Impressive!! This is one of the items it
came up with... How do I change SSH so that access directly as root is NOT
allowed?

* Check: SSH
   Searching for sshd_config...
   Found /etc/ssh/sshd_config
   Checking for allowed root login...
   Watch out Root login possible. Possible risk!

Regards
Chris


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux