Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Watch CryptoLocker (Ransomware) in Action

 

Rating :

 

Comments

 
  • jjlinser
    jjlinser at December 16,2016
    Wow this looks awesome. I like the graphic part of it and how it helps you find relationship between objects. The commandline also seems simple and that it could be picked up by your average joe.
  • jjlinser
    jjlinser at December 16,2016
    Wow this looks awesome. I like the graphic part of it and how it helps you find relationship between objects. The commandline also seems simple and that it could be picked up by your average joe.
  • jjlinser
    jjlinser at December 16,2016
    Wow this looks awesome. I like the graphic part of it and how it helps you find relationship between objects. The commandline also seems simple and that it could be picked up by your average joe.
  • ahammes12
    ahammes12 at December 16,2016
    This video was informative, however you could probably spend hours going through and learning all of its features. This is definitely a great tool for gathering information. It seems like it will be able to tell you everything you need to know about what’s going on in your network. The image-capturing feature seems to be very useful.
  • L
    L at December 16,2016
    Great tutorial video. I now am aware of a couple of tools that can be used for information gathering. Backtrack makes pen-testing easier with the tools readily available.
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved