Back to Results
First PageMeta Content
Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing


Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:
Add to Reading List

Document Date: 2015-03-19 08:13:16


Open Document

File Size: 3,36 MB

Share Result on Facebook

Company

Tripwire Inc. / VMware / /

Event

Bankruptcy / /

Facility

Port Scan/Vulnerability Scan Infected Host ■■ Scanning For Rootkits ■■ Additional Exploration / Library Calls System / Monitoring Library / /

IndustryTerm

open source network / real-time network traffic / respective Internet protocols / real-time decomposition / nonlaboratory systems / network visualization tool / mail server / real-time traffic / java based network capture tool / command line tool / ltrace tools / real-time network traffic emanating / network traffic analyzing utilities / security tools / pstree utilities / real-time data relating / /

OperatingSystem

UNIX / Linux / Microsoft Windows / /

Organization

Linux Introduction In Chapter / /

Person

Eugene Spafford / Marcus Ranum / Bruce Potter / Brian Wotring / Gene Kim / Eric Gerber / Joanna Rutkowska / /

Position

investigator / AIDE / counsel / system administrator / first AIDE / digital investigator / administrator / /

ProgrammingLanguage

Perl / /

Technology

Linux System / Linux / UNIX / command line interface / Perl / operating system / anti-virus software / respective Internet protocols / encryption / java / GUI / /

URL

http /

SocialTag