
Hacking with Go: Part 2
Go Time: Golang, Software Engineering
00:00
How to Deploy a Malware Detection Tool in an Infected Network
In a typical incident scenario, then you would have people that go into what we call forensics mode. They will collect all the hard drives that try to figure out exactly what happened inside the network. Some very stealthy attackers will decide that they would rather lose access and leave forensic traces on hard drive. Most of them feel like they would rather leave some kind of trace, knowing that most people don't look anyway.
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.