<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="https://net.nthu.edu.tw/netsys/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://net.nthu.edu.tw/netsys/feed.php">
        <title>網路系統組 en:security</title>
        <description></description>
        <link>https://net.nthu.edu.tw/netsys/</link>
        <image rdf:resource="https://net.nthu.edu.tw/netsys/_media/wiki:favicon.ico" />
       <dc:date>2026-05-14T04:39:03+08:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://net.nthu.edu.tw/netsys/en:security:audit"/>
                <rdf:li rdf:resource="https://net.nthu.edu.tw/netsys/en:security:netguard"/>
                <rdf:li rdf:resource="https://net.nthu.edu.tw/netsys/en:security:phishing"/>
                <rdf:li rdf:resource="https://net.nthu.edu.tw/netsys/en:security:report_response_workflow"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://net.nthu.edu.tw/netsys/_media/wiki:favicon.ico">
        <title>網路系統組</title>
        <link>https://net.nthu.edu.tw/netsys/</link>
        <url>https://net.nthu.edu.tw/netsys/_media/wiki:favicon.ico</url>
    </image>
    <item rdf:about="https://net.nthu.edu.tw/netsys/en:security:audit">
        <dc:format>text/html</dc:format>
        <dc:date>2009-03-04T11:26:03+08:00</dc:date>
        <title>en:security:audit</title>
        <link>https://net.nthu.edu.tw/netsys/en:security:audit</link>
        <description>Security and System Auditing Tools

rkhunter

Rootkit Hunter (RKH) is an easy-to-use tool which checks
computers running UNIX (clones) for the presence of rootkits
and other unwanted tools. 

&lt;http://www.rootkit.nl/projects/rootkit_hunter.html&gt; 

[rkhunter]

chkrootkit

chkrootkit is a tool to locally check for signs of a rootkit.
It contains:</description>
    </item>
    <item rdf:about="https://net.nthu.edu.tw/netsys/en:security:netguard">
        <dc:format>text/html</dc:format>
        <dc:date>2020-12-22T11:11:10+08:00</dc:date>
        <title>en:security:netguard</title>
        <link>https://net.nthu.edu.tw/netsys/en:security:netguard</link>
        <description>Network Abuse

Daily Internet threat information

&lt;https://isc.sans.edu&gt;



Network Abuse Usage Processing report

According to“National Tsing-Hua University Network Policy” or “Network Abuse Policy”, the Computer and Communication Center will disconnect the IP of an improper user who gets involved in suspected infringement or attacking the campus network.</description>
    </item>
    <item rdf:about="https://net.nthu.edu.tw/netsys/en:security:phishing">
        <dc:format>text/html</dc:format>
        <dc:date>2020-01-13T15:27:30+08:00</dc:date>
        <title>en:security:phishing</title>
        <link>https://net.nthu.edu.tw/netsys/en:security:phishing</link>
        <description>Phishing scams via mails

Internet resources

	*  「Phishing,」  wikipedia
	*  「What are phishing scams and how can I avoid them?,」 Indiana University

Our reminder

	*  Real IT administrators NEVER attempt to acquire your username and password via emails. And the bad guys usually do it by phishing mails. Therefore,</description>
    </item>
    <item rdf:about="https://net.nthu.edu.tw/netsys/en:security:report_response_workflow">
        <dc:format>text/html</dc:format>
        <dc:date>2018-09-12T15:45:21+08:00</dc:date>
        <title>en:security:report_response_workflow</title>
        <link>https://net.nthu.edu.tw/netsys/en:security:report_response_workflow</link>
        <description>Procedure of Information and Communication Security Report

	*  The Network Systems Division of the Computer and Communication Center serves as the contact point for reports of cyber attacks on the campus network and for reporting such attacks to the external authorities.</description>
    </item>
</rdf:RDF>
