Rootkit Attack Advanced Persistent Threats Spear Phishing Attack Botnet Attack admin See author's posts Post navigation Developers at your company are creating a web application which will be available for use by anyone on the Internet. The developers have taken the approach of implementing a Three-Tier Architecture for the web application. The developers are now asking you which network should the Presentation Tier (front-end web server) be placed in? Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts. After opening one of them he noticed that it’s very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?