Chapter 8. Recovery and Response Hacks #96-100 Section 96. Image Mounted Filesystems Section 97. Verify File Integrity and Find Compromised Files Section 98. Find Compromised Packages with RPM Section 99. Scan for Root Kits Section 100. Find the Owner of a Network |