Chapter 10. Compromising a Unix Host
Unix systems directly connected to the Internet are often subject to hacking attempts. If you gain a reputation as being skilled in computer forensics, you’ll probably have many opportunities to examine one of these Unix systems. Unix systems are not used for personal workstations as often as Windows or Macintosh systems are, although most attackers probably use Unix to launch their attacks. Technical folks tend to use Unix for their everyday workstations, but the number of people using personal productivity applications on Unix systems is fairly small compared to the more popular workstation environments. Unix is most often used for servers, including Internet Web servers, so Unix systems are often the ...
Get Computer Forensics: Incident Response Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.