Basic Steps in Forensic Analysis of Unix Systems Anthony Pell 1 min read Nov 29, 2004 This document, written by Dave Dittrich, provides a great foundation for performing a postmortem on your box once it's been rooted. Prev: Intrusion Detection Systems for your network Next: VTun