Chapter 8. Recovery and Response

    Hacks #96-100

    Section 96.  Image Mounted Filesystems

    Section 97.  Verify File Integrity and Find Compromised Files

    Section 98.  Find Compromised Packages with RPM

    Section 99.  Scan for Root Kits

    Section 100.  Find the Owner of a Network