• Boot camps & training
  • Awareness & anti-phishing
  • Community
Infosec Resources Home
  • Topics
    • Cyber ranges
      Threat Intelligence
      General security
      Hacking
      Healthcare information security
    • Penetration testing
      Phishing
      Data breach
      Insider threat
    • Capture the flag (CTF)
      Data recovery
      DoD 8570
      Security awareness
      + View All
  • Certification prep
    • CISSP
      CCSP
      CGEIT
      CEH
      CCNA
    • CISA
      CISM
      CRISC
      A+
      Network+
    • Security+
      CASP+
      PMP
      CySA+
    • CMMC
      CSIH
      Microsoft Azure
      Other
      + View All
  • Career guidance
    • IT auditor
      Cybersecurity architect
      Cybercrime investigator
      Penetration tester
    • Cybersecurity consultant
      Cybersecurity analyst
      Cybersecurity engineer
      Cybersecurity manager
    • Incident responder
      Information security auditor
      Information security manager
      + View All
  • Events
  • Podcast
  • About
    • Contributors
  • Search
  • Main Menu

Yimi Hu

Yimi Hu has just received his MS degree with the Department of Information Security in Beijing University of Posts and Telecommunications, Beijing, China. Currently, he is looking for a job on information security, such as malware researcher or vulnerability analyst and so on. His research interests include reverse engineering and IoT security

Virtualization security May 24, 2017 Yimi Hu
Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection
The virtual machine protection refers to the kind of software protection technology by which the original executable and readable code are translated into...
Hacking January 13, 2017 Yimi Hu
A Brief Summary of Encryption Method Used in Widespread Ransomware
Try to describe encryption method in such a simple way that everyone can understand it easily. Ransomware is kind of computer malware which kidnaps personal...
Infosec Resources Home

Join our newsletter

Get the latest news, updates & offers straight to your inbox.
  • This field is for validation purposes and should be left unchanged.
© 2021 Infosec Resources
  • Privacy Policy
Topics
  • Cyber ranges
  • Threat Intelligence
  • General security
  • Hacking
  • Healthcare information security
  • Penetration testing
  • Phishing
  • Data breach
  • Insider threat
  • Capture the flag (CTF)
  • Data recovery
  • DoD 8570
  • Security awareness
  • + See All Topics
Certifications
  • CISSP
  • CCSP
  • CGEIT
  • CEH
  • CCNA
  • CISA
  • CISM
  • CRISC
  • A+
  • Network+
  • Security+
  • CASP+
  • PMP
  • CySA+
  • CMMC
  • CSIH
  • Microsoft Azure
  • Other
  • + See All Certifications
CyberSecurity Careers
  • IT auditor
  • Cybersecurity architect
  • Cybercrime investigator
  • Penetration tester
  • Cybersecurity consultant
  • Cybersecurity analyst
  • Cybersecurity engineer
  • Cybersecurity manager
  • Incident responder
  • Information security auditor
  • Information security manager
  • + See All Careers