• Use IDS (Intrusion Detection Techniques) –chkrootkit –Tripwire –AIDE (Advanced Intrusion Detection Environment) –Fcheck • Usage of an integrity checker • Snort