Sponsored Content
Full Discussion: Our system was hacked
Special Forums Cybersecurity Our system was hacked Post 303037153 by Neo on Wednesday 24th of July 2019 10:51:59 PM
Old 07-24-2019
Turn on logging including router logging and closely monitor the logs.

Create a honeypot to lure the hackers into your logging traps, if you are interested to discover who is responsible.

Good job on keeping your backups up to date!
This User Gave Thanks to Neo For This Post:
 

3 More Discussions You Might Find Interesting

1. Linux

pc hacked

Hi, i think someone has hacked my server, the following rules used to come which i haven't put. Please help me i couldnt find out how this rules are apply, i think someone has put an script which generates enables the rules. But after restarting the iptables everything seems to be working... (0 Replies)
Discussion started by: naik_mit
0 Replies

2. Cybersecurity

How to know when you've been hacked

One of the most important ways to keep tou machine secure is to know when it has been broken into. The less time hackers have on your system, the less they can do to it, and the greater you chancens of kicking them off and repairing the damage. The more sophisticated the hacker, the less likely... (8 Replies)
Discussion started by: binhnx2000
8 Replies

3. Cybersecurity

Server hacked on known port

Hi, There is a recent case whereby it was reported that one of the production servers was hacked on port 1521. However, I am not sure how this was possible, as I checked that the OS firewall (iptables) is on : # /etc/init.d/iptables status Table: nat Chain PREROUTING (policy ACCEPT) num ... (7 Replies)
Discussion started by: anaigini45
7 Replies
TAR(1)							      General Commands Manual							    TAR(1)

NAME
tar - archiver SYNOPSIS
tar key [ file ... ] DESCRIPTION
Tar saves and restores file trees. It is most often used to transport a tree of files from one system to another. The key is a string that contains at most one function letter plus optional modifiers. Other arguments to the command are names of files or directories to be dumped or restored. A directory name implies all the contained files and subdirectories (recursively). The function is one of the following letters: c Create a new archive with the given files as contents. x Extract the named files from the archive. If a file is a directory, the directory is extracted recursively. Modes are restored if possible. If no file argument is given, extract the entire archive. If the archive contains multiple entries for a file, the lat- est one wins. t List all occurrences of each file in the archive, or of all files if there are no file arguments. r The named files are appended to the archive. The modifiers are: v (verbose) Print the name of each file treated preceded by the function letter. With t, give more details about the archive entries. f Use the next argument as the name of the archive instead of the default standard input (for keys x and t) or standard output (for keys c and r). u Use the next (numeric) argument as the user id for files in the output archive. This is only useful when moving files to a non-Plan 9 system. g Use the next (numeric) argument as the group id for files in the output archive. EXAMPLES
Tar can be used to copy hierarchies thus: {cd fromdir; tar c .} | {cd todir; tar x} SOURCE
/sys/src/cmd/tar.c SEE ALSO
ar(1), bundle(1), tapefs(1) BUGS
There is no way to ask for any but the last occurrence of a file. File path names are limited to 100 characters. The tar format allows specification of links and symbolic links, concepts foreign to Plan 9: they are ignored. TAR(1)
All times are GMT -4. The time now is 05:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy