This video belongs to the openHPI course Tatort Internet - Angriffsvektoren und Schutzmaßnahmen. Do you want to see more?
Previous
3.4 Keylogger
Next
3.5 Rootkits und Backdoors