This log exists because PC threats are increasingly more sophisticated. It's my way of not only documenting the threats and methods used to remove them, but to voice the frustration IT people feel when faced with the daunting task of trying to maintain data on systems that are severely infected.
I'm not Scooby Doo. I don't always have the answer, which is the second reason I started this log, to give voice to others who may have run into some of the same malicious software (aka malware). However because of the nature of my work (rebuilding and repairing PCs) I get the opportunity to see a very large amount of infected computers.
This is their story...
No comments:
Post a Comment