O'Reilly logo

Computer Forensics: Incident Response Essentials by Warren G. Kruse, Jay G. Heiser

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Compromising a Unix Host

Unix systems directly connected to the Internet are often subject to hacking attempts. If you gain a reputation as being skilled in computer forensics, you’ll probably have many opportunities to examine one of these Unix systems. Unix systems are not used for personal workstations as often as Windows or Macintosh systems are, although most attackers probably use Unix to launch their attacks. Technical folks tend to use Unix for their everyday workstations, but the number of people using personal productivity applications on Unix systems is fairly small compared to the more popular workstation environments. Unix is most often used for servers, including Internet Web servers, so Unix systems are often the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required