Day 25 - Finding and Removing Hidden Files and Directories

Published: 2008-10-25
Last Updated: 2008-10-31 02:05:51 UTC
by Koon Yaw Tan (Version: 1)
0 comment(s)

Today is the last day on Eradication Phase. The topic is "Finding and Removing Hidden Files and Directories". What are your tools or steps to detect, discover and possible recover hidden files and directories, be it on Windows, Unix or Mac OS platform?

Let share your valuable knowledge with the rest. Send to us via our contact form and we will update for everyone. Thanks.

Update:
Our reader, Greg, shares with us one of his tools he uses to fight malware on Windows: Eset Sysinspector.
 

Keywords: Awareness2008
0 comment(s)

Day 26 - Restoring Systems from Backup

Published: 2008-10-25
Last Updated: 2008-10-31 02:03:13 UTC
by Rick Wanner (Version: 1)
0 comment(s)

You've identified the incident, contained the exposure, eradicated the problem, and now...Welcome to Recovery week!

Every security professional knows that reliable backups of critical systems are vital to the long term succes of your business.  Every organization big or small, should have a backup strategy and should regularly test their backup and recovery process to ensure it will work when it is finally needed.

Today on Day 1 of recovery week we want your tips, tricks and advice on the topic of restoring from backup. If you have any ideas, war stories, or anecdotes, please send them to us via our contact page. Please, be sure to put something in the subject like "Day 26 - " to make it easier for us to sort them. I will update this diary with your comments and thoughts throughout the day.

-- Rick Wanner rwanner at isc dot sans dot org

0 comment(s)

Comments

cwqwqwq
eweew<a href="https://www.seocheckin.com/edu-sites-list/">mashood</a>
WQwqwqwq[url=https://www.seocheckin.com/edu-sites-list/]mashood[/url]
dwqqqwqwq mashood
[https://isc.sans.edu/diary.html](https://isc.sans.edu/diary.html)
[https://isc.sans.edu/diary.html | https://isc.sans.edu/diary.html]
What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/

Diary Archives