[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
<Sigh>
>>>>> Craig == Craig Andrews <Craig.Andrews [at] currantbun.com> writes:
Craig> A word of warning... DO NOT, UNDER ANY CIRCUMSTANCES,
Craig> DOWNLOAD linzipv1.tgz FROM DOWNLOAD.COM!!!
Have you told them about this yet?
Craig> Now what I want to know is, how do I put this hunk o' junk
Craig> back to normal, and prevent such nasties happening again.
Put things back to normal? Start by pulling the physical plug on all
possible Internet connections, logging in as root and backing
everything up. Then fdisk and reinstall from distribution media, not
your backup. There's some chance you've been cracked and the machine
is now full of rootkit.
When you restore your own data, throw away all binaries and rebuild
from scratch. Review the code to make sure the source hasn't been
hacked.
If you don't feel that paranoid, alternatively you can log in as root,
check owner and perms on your normal executable directories and their
contents, check owner and perms on your user home hierarchies, etc.
You need to figure out why ordinary users can't do much.
Craig> I can't remember, unfortunately, wether I was logged in as
Craig> me, or su'ed to root when running it. As far as I can
Craig> remember tho', I was only logged in as me.
The fact that root still works suggests that you weren't root at the
time. Log in as a normal user and see what your PATH variable looks like.
Craig> Please help quickly, as I have several assignments which
Craig> need completing as soon as poss, in being unable to even
Craig> look at them is quite unfortunate.
What's wrong with working as root?
--
University of Tsukuba Tennodai 1-1-1 Tsukuba 305-8573 JAPAN
Institute of Policy and Planning Sciences Tel/fax: +81 (298) 53-5091
_________________ _________________ _________________ _________________
What are those straight lines for? XEmacs rules.
Start your own FREE mailing list at
© 2000 Microsoft Corporation. All Rights Reserved