Software Design

Hunter (Signature and Hash tool)

There is no one silver bullet for the Advance Persistent Threat (APT).  However, it is critical to know your running environment and what exist on systems.  This is a critical first step to even begin to grapple with APT (Advance Persistent Threat).

System administrators and security analysts often need to assess the validity of Windows system and application files loaded on a critical end-point or server device. Questions about where files came from, whether the files have been maliciously modified, whether a troublesome version is present.

Subscribe to RSS - Software Design