07-24-2019
Turn on logging including router logging and closely monitor the logs.
Create a honeypot to lure the hackers into your logging traps, if you are interested to discover who is responsible.
Good job on keeping your backups up to date!
This User Gave Thanks to Neo For This Post:
3 More Discussions You Might Find Interesting
1. Linux
Hi,
i think someone has hacked my server, the following rules used to come which i haven't put. Please help me i couldnt find out how this rules are apply,
i think someone has put an script which generates enables the rules.
But after restarting the iptables everything seems to be working... (0 Replies)
Discussion started by: naik_mit
0 Replies
2. Cybersecurity
One of the most important ways to keep tou machine secure is to know when it has been broken into. The less time hackers have on your system, the less they can do to it, and the greater you chancens of kicking them off and repairing the damage.
The more sophisticated the hacker, the less likely... (8 Replies)
Discussion started by: binhnx2000
8 Replies
3. Cybersecurity
Hi,
There is a recent case whereby it was reported that one of the production servers was hacked on port 1521. However, I am not sure how this was possible, as I checked that the OS firewall (iptables) is on :
# /etc/init.d/iptables status
Table: nat
Chain PREROUTING (policy ACCEPT)
num ... (7 Replies)
Discussion started by: anaigini45
7 Replies
LEARN ABOUT OSF1
db_printlog
db_printlog(8) System Manager's Manual db_printlog(8)
NAME
db_printlog - Displays database log file (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_printlog [-h home]
FLAGS
Specify a home directory for the database. The correct directory for enhanced security is /var/tcb/files.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_printlog utility provides a way to view the log file associated with the security database.
RETURN VALUES
The db_printlog utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_checkpoint(8), db_recover(8), db_stat(8) delim off
db_printlog(8)