If you have ever discovered a system attack, you know that reloading the system and all its applications would be the first thing to do because you can’t identify the files an intruder may have ...