Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
Rodrigue Fouafou Is An Important Man in Africa’s Startup Sector
Lesson from Ingenious Marketing of Distributed Sports Betting in Nigeria
9.4 – Malware Setup, FUD and Avoidance (Part 2)
Setup Port forwarding (on Attacker’s system) After delivering Trojan to your victim, you only need to do one more thing on your system – enable port forwarding on your router. This is necessary and the most important part of the process. Now, how can you enable port forwarding on your system? Well, you only […]
9.3 – Malware Setup, FUD and Avoidance (Part 1)
There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker performs Trojan attack only in a LAN (Local Area Network) and is able to control any system within that network. To do this, he needs to somehow install Trojan client software […]
9.2 – Methods of Malware Analysis
In this section, let us examine some of the methods which are used in malware analysis. Detecting Packed/Obfuscated: Packed or unpacked malware is malware that has been altered during a runtime compression, so that the malware will become tougher to be acknowledged by antivirus, making it tougher for malware researchers to carry out malware analysis. […]






