This document outlines suggested steps for determining if your system has been compromised.