Menu
Sign In Pricing Add Podcast

The Changelog: Software Development, Open Source

The great escape room (Friends)

4116.161 - 4141.288 Adam

How do these threat hunters get access to the infected systems without fear of additional hacks? Is it like the Heisenberg effect? By inspecting it, you're actually modifying it. Is it like clone a snapshot of the disk and work with it offline? Or what do they do in order to actually go about their work?

0
💬 0

Comments

There are no comments yet.

Log in to comment.