The second day in our "recovery" phase: A system isn't exactly "safe" after the malware is removed. What you actually need to figure out is how the system got compromissed in the first place, and how to prevent a future compromisse. As already pointed out, just removing the malware will just get you back to getting exploited again. What software and what tricks do you use to:
------ |
Johannes 4479 Posts ISC Handler Oct 31st 2008 |
Thread locked Subscribe |
Oct 31st 2008 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!