#Linux Rootkit Security
It is important to use a rootkit checker to ensure that you system is not compromised. These work by looking for code sequences from known rootkits and comparing various files against MD5 checksums when the system is known to be clean (ie after initial installation).
Two such programs are:
- Rootkit Hunter (www.rootkit.nl)
- chkrootkit (www.chkrootkit.org)
These should be run regularly, preferably from Cron. It also helps to run them when the computer is online so that they can automatically update their database of known rootkits.