Spy vs. Spy: Counter-intelligence methods - 0 views
-
James Thomas on 20 Apr 13This was an interesting and informative paper about rootkit design and methodologies to help us better understand their capabilities, and it give ways in which one can spy on the attackers.