EDN Admin
Well-known member
It is always a ‘cat and mouse’ game! Funny and scary at the same time. When you try to get access to the victim’s computer, all your moves are logged, but computer owners dont always check for them. If they check, you are in trouble unless you delete the traces or fake your identity. If you fake your identity, somebody sooner or later will find you. Really?! Sounds like the never-ending skill fight! If you are interested in advanced techniques for hiding and detecting traces, techniques for launching malicious apps, debugging Windows, cheating on malware and playing with Windows working as a honeypot—this session is for you! <blockquote class="info If you are a delegate at Teched Europe 2012 that attended this session https://register.europe.msteched.com/evaluation.aspx?sc=SIA301 please submit an evaluation . Note that you will need to login with the same credentials you used when registering for the event.</blockquote> <img src="http://m.webtrends.com/dcs1wotjh10000w0irc493s0e_6x1g/njs.gif?dcssip=channel9.msdn.com&dcsuri=http://channel9.msdn.com/Feeds/RSS&WT.dl=0&WT.sessionid=Session:RSSView:e13c36c06d6346fdab09a07a0171a3cc
View the full article
View the full article