Quote:
Originally Posted by
SInt
.... I hope none of you guys reacts now how most people reacted: "this guy is crazy, give him more meds" or something. I know it sounds crazy and it is crazy. But lets say my observations are correct where could the entry point be for an attacker?
Risk is based on many factors, which include:
- Threat
- Vulnerability
- Criticality
If I read your post correctly, it sounds like you feel like there is a threat based on your interaction with some groups on the net and your systems are vulnerable. So, the main question which remains is how critical is the Linux computer system you are worried about?
If the system is really important and a breach would amount to serious loss, then you should really consider getting a professional to help you.
If the system has nothing important running on it; then you could just rebuild it from a scratch if you are worried.
If the system has backups, you could recover the system from a backup that was from a time prior to the hacking incident being discovered.
There are lots of options and the way you move forward depending on the risk profile of the system and that depends on the intersection of the three areas I mentioned above (1) threat, (2) vulnerability and (3) criticality.