Hacks #96-100
Section 96. Image Mounted Filesystems
Section 97. Verify File Integrity and Find Compromised Files
Section 98. Find Compromised Packages with RPM
Section 99. Scan for Root Kits
Section 100. Find the Owner of a Network