Find the answer to your Linux question:
Page 2 of 2 FirstFirst 1 2
Results 11 to 14 of 14
I'm not good enough with "locate" to yet know how to separate out by date but I'm certain it can be done. try "man locate" for options. Full path to ...
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #11
    Trusted Penguin Dapper Dan's Avatar
    Join Date
    Oct 2004
    Location
    The Sovereign State of South Carolina
    Posts
    4,630

    I'm not good enough with "locate" to yet know how to separate out by date but I'm certain it can be done. try "man locate" for options. Full path to updatedb on my machine is: "/usr/bin/updatedb." You could also do:
    Code:
    locate updatedb
    Linux Mint + IceWM Registered: #371367 New Members: click here

  2. #12
    Just Joined!
    Join Date
    Aug 2012
    Posts
    54

    Exclamation Malware Removal

    I think my previous F Opyum Team attack, have created/installed some malware within my pages. So now my homepage activates malware but only sometimes. Not with every request.

    Is there anyway to find the malware and fix the issue without restoring any backup?

    I have a VPS/Webmin/CentOS 5 or 6 im not sure.

    Please help

  3. #13
    Trusted Penguin Irithori's Avatar
    Join Date
    May 2009
    Location
    Munich
    Posts
    3,425
    Nope.
    Previous recommendation still stands.
    Install from scratch.
    You must always face the curtain with a bow.

  4. $spacer_open
    $spacer_close
  5. #14
    Just Joined!
    Join Date
    Aug 2009
    Posts
    83
    Quote Originally Posted by Website View Post
    I think my previous F Opyum Team attack, have created/installed some malware within my pages.
    It would help clarify things if you followed previous advice and made your host perform a complete restore or not. Because if they did then they might have restored a backup that was already infected.

    As far as I've seen Opyum is only deployed after the attacker gained root so the notion of somehow being able to "contain and clean up" is completely misplaced and any attempt at doing so anyway will prove to be a waste of time. If you're one of those users who chose Linux because it was a cheap deal (kind of evidenced by you saying "i am not good with linux commands" and using a web-based server management panel) then you should realize that because Linux is available free of cost does not mean using it is free of responsibilities.

    It would be best if you start by gaining basic and admin Linux knowledge (search for "Rute" and see your distributions documentation to start with) and use a local Linux installation to practice (use any virtualization like QEmu, VirtualBox, VMWare or whatever you prefer) and mimic / mirror your production host on. After you feel comfortable enough you should ask your host for a clean installation (meaning no running publicly accessible services except SSH), properly harden it and only then configure and harden your publicly accessible services.

    Security being an ongoing process what I've outlined is in a nutshell the start of things and doesn't include everything you should do to have and maintain a well-performing, trustworthy system. If that sounds like too much for you then try to see things from a different point of view: your unique (let's hope so) web site content and the time and effort you put into things represents an investment. And only a fool would think an investment doesn't need protecting.

Page 2 of 2 FirstFirst 1 2

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •