Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Chinese APT hackers remotely controlling a victim.

 

Rating :

 

Comments

 
  • busterhax
    busterhax at November 27,2015
    I'm surprised TOR hasn't become more mainstream than it already has considering the benefits it offers for normal legitimate use on the web.
  • sagarwa9
    sagarwa9 at December 08,2015
    Everything can be used in a good way or in a bad way. Tor initially developed to provide secure communications for law enforcement agencies is now used by hackers to secure their link from these very agencies.
  • brober15
    brober15 at December 10,2015
    The production choices in this video were interesting, to say the least. But I am glad he at least mentioned the use of TOR as a place for individuals living under oppressive regimes to communicate. It's not just a place to buy guns, drugs, and fake identities. I also had never thought of TOR as a fledgling internet, which is an interesting analogy.
  • canales
    canales at January 22,2016
    This was very interesting to me. Being new to the fields and trying to see whats out there always brings a new train of thought. I have heard about Tor but didn't know much about it. I only heard bad things about it. This video clearly explains that TOR is not only used for bad uses but it also has its good use.
  • canales
    canales at January 22,2016
    Also, I did not know how easy it was to purchase illegal items with out the fear of getting caught. This video makes you realize that there is another world out there. With a click of a button you can purchase anything from drugs to weapons.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved