Mining for P2P Evidence training at Techno Security 2010

WetStone is offering a new class at Techno Security 2010: Mining for P2P Evidence

Criminals utilize Peer to Peer technologies to communicate, share information and contraband. In addition, malicious software such as Botnets, Zombies and Trojans utilize these protocols for command and control once target computers have been compromised. During this one day emersion class students will use the latest tools, techniques and methodologies to extract and examine information from P2P activities.

More information at

Leave a Comment

Latest Videos

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feeds settings page to add an API key after following these instructions.

Latest Articles