23 Feb
2010
23 Feb
'10
3:31 p.m.
Place an ids in front of the server and write a rule for the traffic signature. Paul B. Sent with Android On Feb 23, 2010 3:25 PM, "Matt Sprague" <msprague@readytechs.com> wrote: The user could also be running the command inline somehow or deleting the file when they log off. Check who was logged onto the server at the time of the attack to narrow down your search. I like the split the users idea, though it could be several iterations to narrow down the culprit. -----Original Message----- From: Ronald Cotoni [mailto:setient@gmail.com] Sent: Tuesday, February ...