Re: Przekazana: Odp: RE: help i've been hacked. :(

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> 2) you could examine disk contents many times later on some other
> machine ("mount -t <fs_type> /path/to/XYZ.image /mnt/XYZ").

If you do this then you should add the "-o ro,noexec" option to the mount
command.  You don't want to run the risk of even accidently running an
infected program or else you could end up infecting the new OS as well.

Eris Caffee


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux