Recently, I had a conversation with a friend about the news he came
across on a popular site about the proliferation of keylogger
software. That is a software which logs the key presses and sends the
data to a remote account.

That conversation set me wondering ... How immune is a linux system
from someone hacking the system and including a key logging utility
with out the users knowledge. I know that certain distributions have
all the ports closed by default. Does having all ports closed alone
circumvent this problem? And what precautions should be taken for the
same. I am talking w.r.t  a home user running linux. A home user is
vulnerable because nowadays with broadband, his computer is always
connected to the internet.

I took one look on the process running in the background in my system
(KDE desktop) using 'top'  and I could'nt figure out which is required
and which is'nt.

I am also aware of using firewalls (I use firestarter on my system).
But if suppose some penetration has happened, as a home user, how do I
find out ? and what are the options before me to sanitise my system ?

Thanks in advance

Ravi


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_idv37&alloc_id865&op=click
_______________________________________________
linux-india-help mailing list
linux-india-help@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to