Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • mcoates1
    mcoates1 at February 07,2016
    I've never hacked into another machine before, but it seems as if with the right tools and persistence, one can easily do it. It's amazing how the person was able to hack into another persons machine and look at all of their emails and steal a lot of the users files.
  • fpazdzin
    fpazdzin at February 16,2016
    It’s interesting how persistent these hackers are. He spends an hour trying to access the victim computers. It just goes to show how dedicated some of these hackers are to getting into their target systems. It also shows just how useless your security measures can be when you fall victim to a phishing email. The first step in securing your system and your files is to be smart about what you click on in your emails and on the sites you visit because a single wrong click can open a door for someone to get into your computer system.
  • adam
    adam at February 16,2016
    This video is both harrowing and terrifying at the same time. Contrasting this with the U.S. Military Cyber Training you can see the offensive and defensive capabilities of both nations battling each other in this landscape. I do believe, in response to mcoates1, that these people prey upon the common majority and if most people took some personal cyber security responsibility they would not fall victim to this.
  • danielm8
    danielm8 at March 04,2016
    It is very frightening how fast it is for someone to be able to gain backdoor access to your computer. The only way to avoid this is good practice and do not click on unknown links?
  • haneen
    haneen at April 12,2016
    This feature can be used in tracking bad people. Like pretending that the agent using one of the groups IP address and other accounts to contact with the other members. Maybe use at least the messages and e-mails for evidence.
    • «
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved