Quoting [EMAIL PROTECTED] ([EMAIL PROTECTED]):

> What does one do now? Is it simply a matter of deleting these files? 

The likely result of doing that is that your machine will continue
to be compromised.  Your data may disappear, be altered, or be sent
to unauthorised parties.  Your system may be used to carry out attacks
on other systems (which will appear to be carried out by you).  Not
good.

A traditional plan for recovery is outlined in my post of a few minutes 
ago.

-- 
Cheers,                        My pid is Inigo Montoya.  You kill -9    
Rick Moen                      my parent process.  Prepare to vi.
[EMAIL PROTECTED]
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to