On 06/23/2017 06:16 PM, Albert Redditt wrote:
>
> Albert_Redditt;2827474 Wrote:
>
> Does anybody know the Kernel source for above ??? Don’t answer
> otherwise!!!
I’m going to risk answering, even though you do not want it, and you do
not deserve it if you are going to yell (I presume this was yelling) at
people who want to help you by fixing the most-likely problem rather than
your own interpretation of the problem, however unlikely.
First, the kernel code is in C; the only code you have posted was in
something that resembed visual basic. Maybe you know C, and maybe you
know it well enough to analyze kernel code, but I seriously doubt that
both of those are true (one or the other may be, though) because you are
not following the logical path to the conclusion, are not using the
understood networking terms, and are apparently not familiar with how
file-based data are transferred across networks.
The place to look for a vulnerability in kernel code would not be anything
that had to do with TCP or IP, but probably with applications that use
them (SCP, NFS, SMB) and then only if you have those services enabled. As
a self-described Linux newbie (you wrote “newby”) you may not be expected
to understand this, but that should also mean you are aware enough that
you should accept counsel from those who do, or at least may. Even if you
get the kernel source (https://github.com/torvalds/linux if you are
interested) you’re not going to find anything about file transfers in the
IP or TCP code, at least not in any meaningful way.
Your next troubleshooting step is to describe exactly ho you created
files, and when you noticed them missing. Describe services you have
added to your box, or those you enabled from the start, and what they do,
how they are configured. Also be sure that if you are synchronizing data
to/from something online, that you have that account secured. It would be
easy to cause your symptoms, without any access to your computer directly,
by logging into something like dropbox and deleting the files there, which
would then delete them locally too.
Finally, if you have been hacked by somebody who can pull off what you
have described, as you have described it, they either have physical access
to your machine (probably when you are out), or your chances of keeping
them out otherwise are smaller than you realize. Hacking isn’t trivial,
and getting through basic security of something like Linux isn’t trivial,
but at the end of the day if you have been targeted by somebody who seems
magical then they are using methods you are not considering, from the
hacking you see on TV, to social engineering their way past your
roommate/spouse, to just breaking and entering and installing malware on
your box. Linux isn’t too big to fail (be hacked), but there are many
likely ways to explain what you are observing without blaming the kernel
TCP/IP stack.
–
Good luck.
If you find this post helpful and are logged into the web interface,
show your appreciation and click on the star below.
If you want to send me a private message, please let me know in the
forum as I do not use the web interface often.