If you suspect that an unauthorized user has gained access to your Linode, your system could be considered compromised. Unfortunately, it’s virtually impossible to determine the full scope of an attacker’s reach into a compromised system. This video shows several methods to recover from a system compromise.
Chapters: 0:00 Introduction
0:55 Rebuilding Your Linode
4:07 Accessing Rescue Mode
6:26 Cloning Your Linode
10:59 Mounting Your Cloned Linode
New to Linode? Get started here with a $100 credit!
Read the doc associated with this video.
Learn more about cloud security.
Subscribe to get notified of new episodes as they come out.
#Linode #AlternativeCloud #CloudSecurity #Linux
Product: Linode, Linux, Infosec; Jay LaCroix;