Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
One method that Michael thought of using was to hide malicious code inside seemingly harmless programs Michael first monitors sites and bulletin boards used by known terrorists and then he is able to
What technique has Michael used to disguise this keylogging software?