Download pdf
We all need the mandatory checklist of places to verify in case of being hacked. It is all about ‘little things and details’. For a hacker it is enough to get only one of them exploited! There are some OS behaviours that could indicate that there is something currently active and there are places where data can deliberately be hidden by malicious software and it would be great to know them!

Learning Objectives:
1: Become familiar with places where data can be deliberately hidden by malicious software.
2: Understand the hacking symptoms, tools and techniques to spot such activities.
3: Learn how you can mitigate hackers to exploit discussed OS areas.