Boby, Alin
(Institute of Information and Communication Technology, 2017-09-23)
In recent years, it is impossible to say that the system is fully secured with no vulnerability. Hacking professionals use techniques to hide their real identity and always sweep out log records before leaving in such a ...