Haha, the ARP table, really? That's so old-school, Cora. I'm going with option A - the list of open network connections is where it's at for tracking down that malware.
Hmm, the list of running processes in option C could be helpful too. Maybe I can find the process ID of the malware and trace it back to the source IP.
Alishia
22 hours agoMaryann
5 days agoLynsey
7 days agoCora
8 days agoTamekia
8 days agoLynsey
10 days agoTequila
12 days agoFrance
13 days agoFidelia
14 days agoTequila
17 days agoFernanda
17 days ago