As a threat hunter/IR practitioner, what is your primary means of determining if a system file is actually a system file and not backdoored?
-
-
Agreed but Twitter polls don't allow multiple selections.

-
Ha, true enough :) A surprising amount of people seem to (only?) rely on sig validation.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.