-
-
Tweet je nedostupan.
-
- Još 18 drugih odgovora
-
-
-
Is this real?
-
its the CEH cert guide from pearson it certifications, version 9. second edition, by michael gregg. and its far from the only problem in the malware chapter.https://www.amazon.com/Certified-Ethical-Hacker-Version-Certification/dp/0789756919/ …
- Još 7 drugih odgovora
Novi razgovor -
-
-
NETCAT DID NOTHING WRONG
-
Maybe netcat should be more introspective about the role it plays. I know the “I’m not bad, I was just drawn that way” theory applies, but at some point you need to take responsibility for your own behavior.
- Još 7 drugih odgovora
Novi razgovor -
-
-
Tweet je nedostupan.
-
so? sophos will flag VNC.
- Još 4 druga odgovora
-
-
-
Trick question. Assuming a Trojan is a (good) inhabitant of a system which could be compromised by an (evil) Trojan horse, I think d) is correct. A Trojan living on the Command shell.
-
well its the "rightest" answer. but using a tool you found on the target OS does not make that tool a trojan. The Greeks didn't sneak into Troy and hide inside a wooden horse they found already in the city.
- Još 3 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.