Hackers sometimes wear bowties.  And sometimes not.

Decorative image illustrating the complexity of reverse engineering malware.

 

Provide Website Feedback: http://www.lsu.edu/feedback                                       Accessibility Statement: http://www.lsu.edu/accessibility