Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
michael then inserts a stealth keylogger into a mapping program file readme txt
What technique has Michael used to disguise this keylogging software?