Project Summary: Find a recent digital forensics case where a Linux system was either compromised or was the origin of an attack. What was the primary method used for the breach/attack (such as brute force, unpatched system, etc)? What steps could have prevented the breach/attack? With all of the resources and information available regarding Linux attacks, how/why are these attacks still occurring and still successful?