http://mowyaze2i4wfnyl5mgmhv67cditlvs4zicqbjj57lzhxfvfphd34dvqd.onion/www/News/2003/20031202
Using tools like
TESO's Burneye, an attacker can alter an executable program to encrypt
its true purpose, hiding it from firewall filters, intrusion detection
systems, anti-virus software and the prying eyes of investigators. Thanks James Troup and Ryan Murray for their general work on all hosts Adam Heath and Brian Wolfe for their work on master and murphy Wichert Akkerman for his work on klecker Dann Frazier and Matt...