Winprom Winpsw Libpcap Winpcap admin See author's posts Post navigation Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts. After opening one of them he noticed that it’s very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time? When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication “open”, but sets the SSID to a 32-character string of random letters and numbers. What is an accurate assessment of this scenario from a security perspective?