Loading
Rating:
Date: 31/05/2019
Feedback Given By: miguel_a_j
Feedback Comment: Very Fast reliable. Very good in communicating throughout the whole assignment. Will recommend
Project Details
Project Status: Completed
This work has been completed by: vickyme
Total payment made for this project was: $15.00
Project Summary: Find a recent digital forensics case where a Linux system was either compromised or was the origin of an attack. What was the primary method used for the breach/attack (such as brute force, unpatched system, etc)? What steps could have prevented the breach/attack? With all of the resources and information available regarding Linux attacks, how/why are these attacks still occurring and still successful?