I'd argue that a known compromised and cleaned system has undergone much more scrutiny (if properly done) than a freshly installed system.

Yes, for the average user (even the average techie) I'd agree that nuke and pave is the way to go, but for people on this list, I'd trust a machine they said was cleaned.

BTW, can the public access this hash database? I have my own, but I'm sure it could be improved.

T


Reply via email to