F5F Stay Refreshed Software Operating Systems You should focus on the elements that need monitoring with TOP.

You should focus on the elements that need monitoring with TOP.

You should focus on the elements that need monitoring with TOP.

F
Frankette44
Posting Freak
809
04-05-2016, 11:57 AM
#1
When using the TOP command, focus on identifying patterns or anomalies in the output. Look for unexpected processes, unusual permissions, or commands that don’t match typical system behavior. Check for hidden services, suspicious file paths, and any requests for elevated privileges. In Task Manager, things are straightforward, but TOP provides deeper insights—compare results across sessions and verify legitimacy of each entry.
F
Frankette44
04-05-2016, 11:57 AM #1

When using the TOP command, focus on identifying patterns or anomalies in the output. Look for unexpected processes, unusual permissions, or commands that don’t match typical system behavior. Check for hidden services, suspicious file paths, and any requests for elevated privileges. In Task Manager, things are straightforward, but TOP provides deeper insights—compare results across sessions and verify legitimacy of each entry.

B
Blue_n0se
Member
57
04-05-2016, 01:48 PM
#2
What are you seeking? These tools aren't ideal for uncovering security flaws since they can't track user activity. They display running processes and performance metrics at the bottom, while the top shows system status. At the beginning, you'll find a list of active processes and statistics. There are many similar utilities available, such as htop, that you might find useful.
B
Blue_n0se
04-05-2016, 01:48 PM #2

What are you seeking? These tools aren't ideal for uncovering security flaws since they can't track user activity. They display running processes and performance metrics at the bottom, while the top shows system status. At the beginning, you'll find a list of active processes and statistics. There are many similar utilities available, such as htop, that you might find useful.

N
Ninjaaaa_FF
Member
51
04-10-2016, 04:23 PM
#3
htop provides a clear overview of CPU usage along with visual charts for memory and swap activity at the top. This format is more intuitive and straightforward than the standard output.
N
Ninjaaaa_FF
04-10-2016, 04:23 PM #3

htop provides a clear overview of CPU usage along with visual charts for memory and swap activity at the top. This format is more intuitive and straightforward than the standard output.

C
CyberPhoenix
Member
167
04-11-2016, 08:08 AM
#4
Maybe there are keyloggers involved or strange network activity.
C
CyberPhoenix
04-11-2016, 08:08 AM #4

Maybe there are keyloggers involved or strange network activity.

M
MCmickps
Junior Member
35
04-11-2016, 08:51 AM
#5
top isn't ideal for monitoring network activity; consider using iptraf-ng to view all connections. Keyloggers typically run as background programs, helping you spot them in the list, though they can be well-camouflaged when designed properly.
M
MCmickps
04-11-2016, 08:51 AM #5

top isn't ideal for monitoring network activity; consider using iptraf-ng to view all connections. Keyloggers typically run as background programs, helping you spot them in the list, though they can be well-camouflaged when designed properly.