This is a dedicated watch page for a single video.
Danny, a black hat hacker, plans to take control of a computer which has very low network activity and to use the same as a zombie to evade the firewall. Which of the following techniques, Danny is planning to use: