When a computer is compromised one of the first things the intruder does is install a root-kit. The article How to scan your Linux-Distro for Root Kits is an excellent step-by-step HOWTO to detect if your systems have been kitted.