I know it sounds weird and I guess not but I had to ask.
I've got a guest infected with some sort of malware that keeps sneakily sending emails and I can't seem to be able to squash it, every time I delete an infected file it pops up somewhere else :-(
So my thoughts were to boot off a forensics live CD and analyze this particular LXC.
Any useful advice?
I've got a guest infected with some sort of malware that keeps sneakily sending emails and I can't seem to be able to squash it, every time I delete an infected file it pops up somewhere else :-(
So my thoughts were to boot off a forensics live CD and analyze this particular LXC.
Any useful advice?