Computing
Cyberwarfare
Software
Cybercrime
Botnets
Denial-of-service attacks
Linux malware
Cryptographic software
Secure Shell
Xor DDoS
OpenSSH
File Transfer Protocol