<div dir="ltr">Oops, the /usr/bon/host file looks OK</div><div class="gmail_extra"><br><div class="gmail_quote">On Sat, Jun 27, 2015 at 10:32 AM, Gerald Waugh <span dir="ltr"><<a href="mailto:gwaugh@frontstreetnetworks.com" target="_blank">gwaugh@frontstreetnetworks.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
On 06/27/2015 10:12 AM, Michael Stauber wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Gerald,<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Server 5106R<br>
cfsadmin<br>
</blockquote>
Out of curiosity? What's "cfsadmin"?<br>
<br>
<br>
</blockquote>
caching file system admin ???<br>
turns out the actual executable appears to have been /usr/bin/host<br>
'top' indicated cfsadmin. I suspect the server is hacked, although the cfsadmin file looks OK?<br>
<br>
<br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature">Gerald Waugh<br><a href="http://www.frontstreetnetworks.com" target="_blank">www.frontstreetnetworks.com</a><br>(318) 734-4779<br></div>
</div>