Hi malware fighters,
Not many use the http proxies, nice article on this subject can be found here:
http://www.windowsecurity.com/articles/SPIKE-BURP-real-world-computer-security-usage-Part1.html
polonus
Hi malware fighters,
Not many use the http proxies, nice article on this subject can be found here:
http://www.windowsecurity.com/articles/SPIKE-BURP-real-world-computer-security-usage-Part1.html
polonus