Cleaning up after a break-in?

Does anyone know some procedures that one might go through after getting hacked? Like clearing your name of any other break-ins from attacks that originated at your system, because the hacker was using it to launch other attacks, and D.O.S?

 

 

 

 

Top