2005-12-19
http://www.cert.org/tech_tips/intruder_detection_checklist.html http://www.cert.org/tech_tips/root_compromise.html