Category Archives: Computer Forensics

Finding the Hidden

If a hacker managed to compromise a server, it can be used for several things like spreading viruses, sending spam, attacking other hosts or steeling and destroying sensitive information stored on the server. Restoring a previous copy of the system