Recently, I had a conversation with a friend about the news he came across on a popular site about the proliferation of keylogger software. That is a software which logs the key presses and sends the data to a remote account.
That conversation set me wondering ... How immune is a linux system from someone hacking the system and including a key logging utility with out the users knowledge. I know that certain distributions have all the ports closed by default. Does having all ports closed alone circumvent this problem? And what precautions should be taken for the same. I am talking w.r.t a home user running linux. A home user is vulnerable because nowadays with broadband, his computer is always connected to the internet. I took one look on the process running in the background in my system (KDE desktop) using 'top' and I could'nt figure out which is required and which is'nt. I am also aware of using firewalls (I use firestarter on my system). But if suppose some penetration has happened, as a home user, how do I find out ? and what are the options before me to sanitise my system ? Thanks in advance Ravi ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_idv37&alloc_id865&op=click _______________________________________________ linux-india-help mailing list linux-india-help@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/linux-india-help