Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]): > What does one do now? Is it simply a matter of deleting these files?
The likely result of doing that is that your machine will continue to be compromised. Your data may disappear, be altered, or be sent to unauthorised parties. Your system may be used to carry out attacks on other systems (which will appear to be carried out by you). Not good. A traditional plan for recovery is outlined in my post of a few minutes ago. -- Cheers, My pid is Inigo Montoya. You kill -9 Rick Moen my parent process. Prepare to vi. [EMAIL PROTECTED] _ Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph To leave: send "unsubscribe" in the body to [EMAIL PROTECTED] To subscribe to the Linux Newbies' List: send "subscribe" in the body to [EMAIL PROTECTED]
