viruses

website

Taylor, a security professional, uses a tool to monitor her company’s website, analyze the website’s traffic, and track the geographical location of the users visiting the company’s website. Which of the following tools did Taylor employ in the above scenario?

Taylor, a security professional, uses a tool to monitor her company’s website,  analyze the website’s traffic, and track the geographical location of the users visiting the company’s website. Which of the following tools did Taylor employ in the above scenario? Option 1 : WAFW00F Option 2 : Webroot Option 3 : Web-Stat Option 4 :  Website-Watcher 1. WAFW00F WAFW00F identifies and fingerprints web Application Firewall (WAF) products. how will it work? To do its magic, …

Taylor, a security professional, uses a tool to monitor her company’s website, analyze the website’s traffic, and track the geographical location of the users visiting the company’s website. Which of the following tools did Taylor employ in the above scenario? Read More »

virus

Which type of virus can change its own code and then cipher itself multiple times as it replicates?

Which type of virus can change its own code and then cipher itself multiple times as it replicates? Option 1 : Cavity virus Option 2 : Tunneling virus Option 3 : Stealth virus Option 4 : Encryption virus 1 . Cavity virus A Spacefiller (Cavity) virus tries to attack devices by filling the empty spaces present in various files. That’s why this rare sort of bug is additionally addressed as a Cavity Virus. Its working …

Which type of virus can change its own code and then cipher itself multiple times as it replicates? Read More »

What is Malware Forensic

What is Malware Forensics?

The genesis of computer viruses started in early 1980s when some researchers came up with self-replicating computer programs. In 1984 Dr. Cohen provided a definition for computer viruses saying, “A virus is program that’s ready to infect other programs by modifying them to incorporate a possibly evolved copy of itself”. This definition is predicated on the behavior of programs of that period, was appropriate. However, overtime viruses have evolved into dozens of various categories and …

What is Malware Forensics? Read More »