F
Fred
I was recently the victim of the Welchia worm, and know
for sure that my computer files / data have been accessed
and / or modified after the worm was activated. How do I
identify the source or attacking computer that has
manipulated and taken control of my computer? Is it the
person that sent the e-mail attachment that contained the
worm, or could it be anyone in the chain that sent the
original e-mail?
Any help at all would be appreciated.
Thanks!
for sure that my computer files / data have been accessed
and / or modified after the worm was activated. How do I
identify the source or attacking computer that has
manipulated and taken control of my computer? Is it the
person that sent the e-mail attachment that contained the
worm, or could it be anyone in the chain that sent the
original e-mail?
Any help at all would be appreciated.
Thanks!