Maybe, maybe not. It depends on the attack. You have to assume that you don't have a clean system. You can't trust your binaries or APIs. If there is a rootkit... it's job is to hide itself.
You...
Search:Type: Posts; User: phishphreek; Keyword(s): Search: Search took 0.03 seconds.
Results 1 to 1 of 1
|
|