OK so one replaces the two corrupted files. What's to stop the attacker (or attack bot) simply modifying them again?
Would it not be a tad premature to ask Google for a review before this is fixed properly?
OK so one replaces the two corrupted files. What's to stop the attacker (or attack bot) simply modifying them again?
Would it not be a tad premature to ask Google for a review before this is fixed properly?