1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
8

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.

After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?
Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
4 0

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

You might be interested in
Why were QR codes created
Crank
QR codes were created to make a way for people to easily scan codes to get to a website. So you could scan (example) a movie poster to go to the website that has advertisements and tickets.
4 0
3 years ago
Read 2 more answers
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
NNADVOKAT [17]
After installing your anti-virus, you must do the following to make sure that your computer will be virus free moving forward:

1. Scan every drive of your computer.
2. Scan every program, photo, video, etc before opening those.
3. Avoid visiting restricted sites.
4. Update your antivirus application. This way, the application gets new virus database.
5. Schedule antivirus scanning.
6. If your antivirus application do not have scheduled scanning, plan it.
7. Install antivirus widgets or extension in your web browser.
8. For maximum protection, you can install another antivirus application.
9. Uninstall risky applications.
10. Scan flashdrives before opening or exploing those. Avoid borrowing flashdrives.
11. Avoid inserting your flashdrives to other devices.
12. Defrag your system. Some virus can't be detected because your system's drive may be badly fragmented.

3 0
3 years ago
Ano ang<br> rotasyon ng daigdig​
Degger [83]

Answer:  are you tying to ask a question

Explanation:

6 0
3 years ago
Read 2 more answers
Write code that prints: Ready! firstNumber ... 2 1 Run!
motikmotik

Answer:

The program to this question can be defined as follows:

Program:

num=int(input("Enter any number: ")) #defining variable num, that take value from user

val=0; #defining variable val

for i in range(num): #defining loop to calculate value in decreasing order

   val=num-i; #holding value in variable

   print(val) #print value

Output:

Enter any number: 3

3

2

1

Explanation:

In the above-given code, a variable "num" is declared, that uses input function to take value from the user end, in the next line a "val" variable is defined, that calculates values and print it in decreasing order.

  • In the next step, a for loop is declared, inside the loop a "val" variable uses num and loop variable "i" to calculate the value in decreasing order.
  • In the last print method is used that prints "val" variable value.
3 0
3 years ago
Ria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the
pickupchik [31]

Answer:

a and d

Explanation:

A. Run the parted command

D. Reboot the system

These two actions will make it easier to manually reload the fdisk

8 0
3 years ago
Other questions:
  • Using functions,
    6·1 answer
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • Jessica wants to purchase a new hard drive. She wants a drive that has fast access because she will use it to edit videos on her
    13·1 answer
  • How many answer or point do I answer/need to sent message?
    6·1 answer
  • What would be the most popular piece of technology on Earth?
    11·2 answers
  • Technician A says that S-cams can be left or right handed. Technician B says that S-cam foundation brakes can have one or two an
    15·1 answer
  • When you use a rest area, you should:
    7·2 answers
  • Which organization publishes a handbook that describes various occupations? U.S. Department of Defense U.S. Department of Agricu
    15·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
  • MSWord is a popular___________ program.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!