How do you search for backdoors from the previous IT person?
Posted
by
Jason Berg
on Server Fault
See other posts from Server Fault
or by Jason Berg
Published on 2010-08-18T15:04:36Z
Indexed on
2012/11/11
5:05 UTC
Read the original article
Hit count: 410
security
We all know it happens. A bitter old IT guy leaves a backdoor into the system and network in order to have fun with the new guys and show the company how bad things are without him.
I've never personally experienced this. The most I've experienced is somebody who broke and stole stuff right before leaving. I'm sure this happens, though.
So, when taking over a network that can't quite be trusted, what steps should be taken to ensure everything is safe and secure?
© Server Fault or respective owner