"Keep in mind that if a machine is compromised, anything on that system
could have been modified, including the kernel, binaries, datafiles,
running processes, and memory. In general, the only way to trust that a
machine is free from backdoors and intruder modifications is to
reinstall the operating system from the distribution media and install
all of the security patches before connecting back to the network."
- CERT Coordination Center
Winning starts before the race begins