The Following User Says Thank You to cpm For This Useful Post: | ||
![]() |
2010-09-05
, 14:05
|
Posts: 992 |
Thanked: 738 times |
Joined on Jun 2010
@ Low Earth Orbit
|
#22
|
The Following User Says Thank You to kureyon For This Useful Post: | ||
![]() |
2010-09-05
, 14:14
|
Posts: 275 |
Thanked: 46 times |
Joined on Feb 2010
|
#23
|
The Following User Says Thank You to Patroclo For This Useful Post: | ||
![]() |
2010-09-05
, 19:39
|
Posts: 51 |
Thanked: 17 times |
Joined on Jun 2009
|
#24
|
The Following User Says Thank You to cpm For This Useful Post: | ||
![]() |
2010-09-06
, 18:24
|
|
Posts: 168 |
Thanked: 58 times |
Joined on Aug 2010
@ Vienna
|
#25
|
There are rootkit detection and related packages for Linux (e.g. chkrootkit, tripwire etc), but I've not seen any of them ported to the N900.
![]() |
2010-09-07
, 09:01
|
Posts: 540 |
Thanked: 288 times |
Joined on Sep 2009
|
#26
|
As far as I understood, there is no way at all to discover a rootkit on n900, isn't it?
And to list ip connections and listening processes, as root: lsof -i
Although a rootkit will probably hide itself so you wouldn't see it by using these commands anyway.