I have developed a website with php and apache server on linux centos I am not professional on security issues and I think some folks try to hack my website first please advice me which security things I should follow
but my problem:
tonight as I tried to login firebug showed it tries to load login.php for serveral times but a file error occurs (I think a permanent move or something....)
anyway when I checked the login.php file in linux I have noticed the file permission has been changed and all x (execution) flags has been removed.
could it be the work of a hacker? what should I do to prevent such happening.
I changed chown to root, and also set chmod of all files from 775 to 755 please give more
rpmbinary from the compromised host, but unless you have all of the packages available on your CD you still need to reference potentially compromised data (the RPM manifests) on the hard drive.) You also can't verify that something not* managed by RPM wasn't installed, removed, or modified... – voretaq7 Dec 03 '13 at 21:42rpmyou will find the following in the section about--root: "Use the system rooted at DIRECTORY for all operations. Note that this means the database will be read or modified under DIRECTORY". That means you'll be using the RPM metadata from the (compromised)--rootin your example above (i.e. "trusting the compromised system's metadata"). If you intend to use RPM data from the CD you've left out a bunch of steps... – voretaq7 Dec 09 '13 at 16:29