Search This Blog

Tuesday, June 23, 2015

The role of proxies and protocols in malware investigations

A lot of people associate online anonymity with Tor, however it is a much deeper issue than this and does not relate only to privacy while browsing. In this post, we will learn some of the key concepts to keep in mind when analyzing malware, because when we talk about anonymity, we need to understand the role played by proxy servers and certain protocols used for communication in such cases.
It’s important to be aware of these concepts, because when someone is trying to establish an anonymous connection these are the fundamental tools employed.


The role of proxies and protocols in malware investigations

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.