Mikko Hypponen

@mikko

CRO at F-Secure ● TED Speaker ● Malware Adventurer

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

Views 882

1577 days ago

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

0 Comments

Realtime comments disabled