well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user trusts explicitly. If the software firewall tells Mr X that explorer.exe needs to access the internet, the user is unlikely to disagree.The malicious hacker has a special program called injector.exe

0 comments:

Post a Comment

WELLCOME MY WEB

 
Top