Remove traces of intrusion from a Unix system