
20 Dec
2019
20 Dec
'19
3:32 a.m.
Brian May via luv-talk wrote:
He also has a backup copy of the files that was not available to the attacker, and was going to compare file sizes. I might suggest he install a program that compares files in two directories, and run that. (any recommendations?).
If the host is compromised, don't plug non-compromised backups into it. That will just result in the backups being compromised, too. Boot some kind of trusted live environment and check things from there.