Hi malware fighters,
Sometimes the malware fighter has use for the instruments of the old resource hacker to combat malware, not to use it for resource engineering purposes, but to replace files that cannot be handled any other way… One of these tools was/is replacer: http://www3.telus.net/_/replacer/
It safely replaces protected or in-use system files. It has entered the public domain, and is no longer actively maintained. What do other malware fighters use under these circumstances? Is replacer a good tool for the malware fighter’s toolbox?
polonus