Please enable JavaScript.
Coggle requires JavaScript to display documents.
malicious software part2, two key logger type, gain access without the…
-
-
-
malware that control by attacker to compromise victime , secretly take the intrnet-attached and use them to lanch or mange other computer.
difficult to traced
-
fake e-mail or website expolite by **social engineering to gain user trust by"
-
-
-