Currently set to No Index

How To Deal With A Possible Intruder On Your Server

You’re cruising through your server’s inner network one fine day, when all of a sudden you notice an unfamiliar name accessing your files. This user may have come through SSH, or any other access method, but no matter the entry port, you certainly don’t want them accessing your files. Before panic sets in and you find yourself pulling the plug on your hard-earned hardware, use the following steps to first ensure that you do have a hacker onboard. Only when you’ve made certain should you blow the whistle—remember that neither customers nor colleagues appreciate a Boy Who Cries Wolf.

Did You Forget A User?

Think about it: Did you create a user with this designation, and then forget about it as the seasons rolled by? Perhaps you left a user behind a long time ago with a weak password, or just haven’t seen this user log-in for a while, and are now experiencing an uncomfortable case of deja vu.

RELATED:   Geek Ethicist: Skype Therapy

Is This An Authorized Robot?

Remember that many of your other servers, such as your database server or your web server, operate within the system as “false” human users. There are also several different services running under the hood that do their jobs in this manner. Before freaking out about a human intruder, check the designation of the “hacker.” If it’s something similar to nobody, noname, sys, or apache, then you’ve not got a problem, just a working robot. If you’re unsure, but think the user might still be a script, do a quick Google search for the user’s name.

 What Are They Doing In There?

RELATED:   Battle of the Giants: Linux and Windows Compared

The next step is to check what the user is actually doing: Are they running a script or program you’re familiar with? This is where things start to heat up, in a software sense: If the user is running a standard application like Apache, then don’t worry your pretty little head. However, if they’re operating a script you’ve never seen, it’s time to do a bit more digging—you may actually have a real intruder on your hands.

 What To Do If Nothing Else Has Worked

If you’ve come this far, then you might genuinely have an intruder on your server. If so, the root user is the only one with the ability to create new accounts. With that in mind, check your root password and account for changes: Plug-ins and extras you have installed may also grant accidental access to the superuser. You may need to hire a security expert to check out your system, if there’s no obvious infiltration.

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Feeling Insecure In Your Current Job Position?
Feeling Insecure In Your Current Job Position?

Job security is one of our primary concerns. We everyday we live with the question of whether or not we will be working the next day. Loyalty is not the...

Leave a Reply

Your email address will not be published. Required fields are marked *