So far in this book, we’ve detailed the malware threats we all face on a day-to-day basis, the tools available for defending against, identifying, and removing malware, and the services and resources available to help you in these tasks.
It seems then that the logical way to bind all of this together is to walk through, step by step, the processes involved in identifying and safely removing malware on an infected PC.
In this case, we’ll examine “zero-day” malware, the term used ...