The damage is already done.
Reposted from
Byron
When an unauthorized, uncleared person or persons accesses a core computer system or network it's all but impossible to know with any degree of certainty that they didn't leave malicious code behind somewhere. The result: all the hardware and software must be scrapped and replaced. /1
Comments