What types of troubleshooting things can be done to rectify the problem - what's the best way to isolate and identify the problem? If I check the files, what types of telltale files shouldn't be in the standard system, that could provide access to a hacker? What if, I'm looking for a set of 'average joe' steps to take, before ditching the entire system?
sort by best latest
You can help the HubPages community highlight top quality content by ranking this answer up or down.