=09I have a client who has a nasty hacker problem. I have reason to beli=
eve=20
that there is some sort of "sleeper" application inside some kind of hidd=
en=20
partition. I came to this conclusion after seeing evidence of the hack=20
return on a repartitioned, formatted, disconnected machine. The hacked u=
sers=20
returned, the machine begins to attempt to phone home. There is no evide=
nce=20
of any hidden partitions using linux fdisk.
Any suggestions? I have heard some form of the dd command can be used to=
=20
overwrite ALL information on this disk. Anyone have any tips for that? =
Or=20
any tips in general, I am tearing my hair out on this one.
Thanks a bunch!
--=20
Kyle Faber
Account Manager
EMR Internet
kyle@emr.net
623-581-0842 voice
623-582-9499 fax
**EMR Internet - Residential & Business Solutions for YOUR business! **
* Dial-up
* DSL
* Web-hosting
* Server Co-Location
* Network Management