Discussion
1. What are some techniques used by malware developers that enable them to disguise their codes to prevent them from being analyzed?
· Must be in APA format. There will be a reduction of points for posts that fail to use in-text citations and have an appropriate reference list.
· Must be at least 500 words
· Must be a scholarly submission.