― Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there. ∙ By enumerating the attacker in the same way that they have enumerated the slave, you will be able to see the bigger picture and establish what you're up against. But how can you do this? Read on... ∙ Don’t forget to Subscribe to our RSS feed ∙ Connections make the [...].