Covering tracks — Hiding files on Windows/Linux/MacOS
Introduction to hiding files After gaining access to a system, a hacker commonly needs to cover their tracks in order to avoid detection. Many antiviruses operate by searching through the list of files...
View ArticleEthical hacking: Log tampering 101
Introduction Getting caught is exactly what every hacker does not want. They want to be able to gain entry into a system and then quickly withdraw to the safety of the internet café they are presumably...
View Article
More Pages to Explore .....