Archive for the ‘Computer Forensics’ Category

Finding the Hidden

If a hacker managed to compromise a server, it can be used for several things like spreading viruses, sending spam, attacking other hosts or steeling and destroying sensitive information stored on the server. Restoring a previous copy of the system will not guarantee that the incident do not happens again. That’s why it is now [...]

Share