Botnet Deep Dive (Part 2): Applications

Поделиться
HTML-код
  • Опубликовано: 29 янв 2025

Комментарии • 5

  • @nsingh452
    @nsingh452 5 лет назад

    Can you please make more videos like this sir !

  • @mirbill24
    @mirbill24 11 лет назад

    A lot of groups (like anonymous) uses ddos attacks as a form of activism.

  • @lindaclaudine3029
    @lindaclaudine3029 9 лет назад

    What does one do when one knows they are compromised - and have been for a long time, have evidence, have actually had their machine taken over while using it, have had VPN software rewritten to direct one's machine to another source - but Apple and ISP refuse to act or even believe them.

  • @vrushabhpatil2867
    @vrushabhpatil2867 4 года назад

    thannxx

  • @kurtisisagaylord2
    @kurtisisagaylord2 11 лет назад

    This is very helpful, thank you!