<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>rkhunter Archives - diditho.com</title>
	<atom:link href="https://diditho.com/tag/rkhunter/feed/" rel="self" type="application/rss+xml" />
	<link>https://diditho.com/tag/rkhunter/</link>
	<description>&#34; Knowing is not enough we must apply. Willing is not enough we must do &#34; - Bruce Lee</description>
	<lastBuildDate>Sat, 12 Jul 2025 15:44:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://diditho.com/wp-content/uploads/2023/11/cropped-diditho-photo-logo-512-x-512-32x32.png</url>
	<title>rkhunter Archives - diditho.com</title>
	<link>https://diditho.com/tag/rkhunter/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Check if Your Debian 12 Server Has Been Breached</title>
		<link>https://diditho.com/2025/07/12/how-to-check-if-your-debian-12-server-has-been-breached/</link>
					<comments>https://diditho.com/2025/07/12/how-to-check-if-your-debian-12-server-has-been-breached/#respond</comments>
		
		<dc:creator><![CDATA[diditho]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 15:44:44 +0000</pubDate>
				<category><![CDATA[dev]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[check debian 12 for breach]]></category>
		<category><![CDATA[chkrootkit]]></category>
		<category><![CDATA[debian 12 hardening]]></category>
		<category><![CDATA[debian 12 security]]></category>
		<category><![CDATA[rkhunter]]></category>
		<guid isPermaLink="false">https://diditho.com/?p=10044</guid>

					<description><![CDATA[<p>In today&#8217;s connected world, securing your Linux servers is non-negotiable. Whether you&#8217;re running a public-facing API, a web application, or internal systems, even a brief intrusion can result in serious damage. If you&#8217;re managing infrastructure on Debian 12 (Bookworm), it&#8217;s crucial to know how to assess whether your server has been compromised. This article walks... <span class="more"><a class="more-link" href="https://diditho.com/2025/07/12/how-to-check-if-your-debian-12-server-has-been-breached/">Continue reading <span class="meta-nav">&#8594;</span></a></span></p>
<p>The post <a href="https://diditho.com/2025/07/12/how-to-check-if-your-debian-12-server-has-been-breached/">How to Check if Your Debian 12 Server Has Been Breached</a> appeared first on <a href="https://diditho.com">diditho.com</a>.</p>
]]></description>
		
					<wfw:commentRss>https://diditho.com/2025/07/12/how-to-check-if-your-debian-12-server-has-been-breached/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
