« Previous 1 2
File Integrity Checks with AIDE
Detection
Conclusions
Changes to binary data and configurations are artifacts of cyberattacks. If you notice them in good time, you might still be able to stop an attacker and prevent the damage spreading across your network. In this article, I looked into how to detect these changes with AIDE.
Infos
« Previous 1 2
Buy this article as PDF
Express-Checkout as PDF
Price $2.95
(incl. VAT)
(incl. VAT)
Buy ADMIN Magazine
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
