"John (EBo) David" wrote: > George Toft wrote: > > > > Hi John, > > > > Post a ps and let the group dissect it. > > Ok... See appended: Output of ps won't mean much if a rootkit has already been installed (search on rootkits - i.e. http://linux.oreillynet.com/pub/a/linux/2001/12/14/rootkit.html) Ideally, you'd have tools running up front to detect unauthorized changes. There are tools though (i.e. chkrootkit - http://www.chkrootkit.org/) to look for signs of compromise even after the fact. Running something like aide or tripwire against critical files is a good detection measure, but it needs to be set up up front. - Bob