HOME
| UTORprotect |
DOCUMENTATION
|
AMS/ROSI
|
SERVICES
|
CONTACT
UTORprotect
Endpoint Security Policy System
Firewalls
Malicious Code
Network Security Policy
Open-Source Firewall
Password Usage Guidelines
Phishing 
Security Incident Reporting
Spam
Spyware 
Symantec Anti-Virus
Windows Security Maintenance
Windows Incident Response
Windows Security

Compromised Systems

A system can be compromised in any number of ways, the most common being "hacking". Hacker is a term often used to describe someone who tries to break into computer systems. Eric Raymond, compiler of The New Hacker's Dictionary, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. The terms "Hacker" and "Hacking" have been adopted by the media and the general population.

Steps for Recovering from a UNIX or NT System Compromise

©2011 - University of Toronto Information + Technology Services. All Rights Reserved.