Tracing a Hacker
Posted by tech master | at 6:48 PM
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.By enumerating the attacker in the same way that they have enumerated the victim, you will be
0 comments: