More Forensic Analyis

To go with Dana’s presentation /. linked to a good article on analyzing a spam compromise where a machine was attacked and used to send spam. This article goes through the detection and analysis. Very interesting!