Analyzing the Entropy of Document Hidden Code

In this webcast, the presenter will show how to automate some of the analysis of this code. By analyzing the entropy of the code extracted most attacks can be detected by searching for the hacker's attempt to avoid detection.

Provided by: Topic: Security Date Added: Jun 2015 Format: Webcast

Find By Topic