Wahid Ali - MEP Project Engineer - Precision skills International | LinkedIn
Mark Lechtik on Twitter: "[4/n] The rootkit also exhibits some anti-forensic methods. An interesting one was the abuse of the end of the .text section in the mapped pci.sys image to introduce