nprimo
97512f9066
|
2 years ago | |
---|---|---|
.. | ||
active | 2 years ago | |
evasion | 2 years ago | |
hole-in-bin | 2 years ago | |
injector | 2 years ago | |
inspector-image | 2 years ago | |
local | 2 years ago | |
mal-track | 2 years ago | |
malware | 2 years ago | |
obfuscator | 2 years ago | |
passive | 2 years ago | |
web-hack | 2 years ago | |
README.md | 2 years ago |
README.md
🛡️ IT Security
⚠️ | In compliance with the laws.
The methods and tools cited in these courses are used for educational and preventive purposes only, and for private use.
The necessary precautions have been put in place to ensure legal learning without risk to others.
It is your responsibility to check the laws applicable in your country and the rules in force.
By integrating this program, you thus declare yourself solely responsible for your actions, and no responsibility on the part of 01 or the instructor will be engaged for the misuse of the content.
By downloading or consulting this document, the user accepts the user license attached to it, as detailed in the following provisions, and undertakes to fully respect it.
The right of use defined by the license is limited to use in an exclusively private setting. This right includes:
- The right to reproduce the document for storage for the purpose of representation on a single computer terminal
- The right to reproduce the document in one copy for backup or printing
No modification of the document in its content, form or presentation nor any redistribution in whole or in part, in any form and medium whatsoever (and in particular by networking) are authorized.
The statements relating to the source of the document and-or its author must be kept in their entirety.
The right of use defined by the license is personal and non-exclusive. Any other use than those provided for by the license is subject to the prior authorization of the author.