Reaching Others University at Buffalo - The State University of New York
Skip to Content

How much time will it cost?

At a minimum, it will require the time for the department to retrieve or move the potentially compromised host and to replace it with a spare machine.  The time involved in processing a machine varies in part on the size of the drive(s) and the nature of the compromise.

Did This Page Answer Your Question?

Email, UBITName or phone number
Enter the letters or numbers you see below in the space provided. Click "Get a new challenge" if they are not readable.