You can do this much easier if you restart your pc and dont launch any programs before your check for established connections. I had about 25 with a good reason for each one before a reboot. After a reboot i had 2. You will have lots of connections during normal use there is a few for your web browser a few for steam ect during normal activity
Great vid Dan ;-) I would have added an 11th item --> Be sure to routinely follow the first ten tips! You can't spot anomalies without knowing what your infrastructure looks like when things are smooth sailing. Remember folks, do these items regularly to help develop a baseline for what things should look like o7
Great video! What if there are two users shown in the terminal using the w command: one with all fields filled out with their information and one with none, but only the user with filled fields is counted as a user , What does that mean?
If a user does a fresh install of Ubuntu and uses a simple root password, could a hacker gain access to their system, if the hacker has the computer’s ip address and root password? Is remote access allowed by default or does a user have to enable remote access?
When I open iftop 2 things pop but they doest seem suspicious so I'm asking if something pop there doest matter what does that mean it's a hacker? Please tell me if you know!
Hey please answer 🙏🏻 i tried to crack my windows password and i got a different password then the one i know. Is that means someone else is using my pc ? Or whats the deal ? Thank you for the video is great
some script is running in my centos. some crons are running. I cannot Delete it . crontab -e /tmp/crontab.0W4JC9: Operation not permitted getting this error. also I can see some unknown processes running. but when i try to kill it -bash: kill: (389095) - No such process. because that process is running with another pid every second. what to do now. please help
Thank You: I haven't seen anyone do this in 30years keep up the good work.
You can do this much easier if you restart your pc and dont launch any programs before your check for established connections. I had about 25 with a good reason for each one before a reboot. After a reboot i had 2. You will have lots of connections during normal use there is a few for your web browser a few for steam ect during normal activity
Great vid Dan ;-) I would have added an 11th item --> Be sure to routinely follow the first ten tips! You can't spot anomalies without knowing what your infrastructure looks like when things are smooth sailing. Remember folks, do these items regularly to help develop a baseline for what things should look like o7
Absolutely! Your comment is very insightful. Thank you so much!
Wonderful job on these videos!
Helped a lot
Great video! What if there are two users shown in the terminal using the w command: one with all fields filled out with their information and one with none, but only the user with filled fields is counted as a user , What does that mean?
If a user does a fresh install of Ubuntu and uses a simple root password, could a hacker gain access to their system, if the hacker has the computer’s ip address and root password? Is remote access allowed by default or does a user have to enable remote access?
Excellent video. Subscribed.
Great video! Thank you sir for helping a Linux/IT noob like myself. Appreciate this clear and direct / good info.
Call me paranoid but I'am doing this everytime when my fan spins like mad.
Yeah! I think it's from the fact that Linux doesn't usually have anti virus. We always show be on the look-out!
was still using htop - just for the btop you get a thumbs up! good video otherwise also, thx
When I open iftop 2 things pop but they doest seem suspicious so I'm asking if something pop there doest matter what does that mean it's a hacker?
Please tell me if you know!
Awsome video, concise and clear. Thanks Dan 🙏
Thank you so much for the support!
thanks, nice. I don't know if you said the line "like and sub and whatnot" but I did it.
Hey please answer 🙏🏻 i tried to crack my windows password and i got a different password then the one i know. Is that means someone else is using my pc ? Or whats the deal ?
Thank you for the video is great
thanks man!
i just checked my root server with iftop, which i didn't know before.
Great! I'm glad you learned one thong or two from my video. Cheers!
Too much too fast for this newbie. A written list would help me more
some script is running in my centos. some crons are running. I cannot Delete it . crontab -e
/tmp/crontab.0W4JC9: Operation not permitted getting this error. also I can see some unknown processes running. but when i try to kill it -bash: kill: (389095) - No such process. because that process is running with another pid every second. what to do now. please help