As there are a running campaign to send malware by mail disguised as invoice or price enquiry, I’d like to have some clue on what those malwares are suppose to do.
I will update the article with what I learn about the process of analysing reverse engineering malware.
The first step is to list the tools, and secure malware handling practice.
Regarding malware handling, I recall you shall handle them in virtual environment but I’d like to read more about it before I attempt anything on that line.
Step 1 – the tools
Oracle VM VirtualBox
This is an OS distribution to analyze both windows and Linux malware. The distro is based on Ubuntu.
Online courses: https://www.sans.org/ ($7000,00)
Tools for linux malware only:
Automating Linux Malware analysis using Limon sandbox:
The image should be relevant to your article. The name of the file should be relevant to the content of the image and be of the form: main-keyword-secondary-keyword.jpg
The image should be served at the size it will be displayed
Use srcset for responsiveness
Serve compressed image if possible in webp.
The number one SEO factor for images is the file name. It should have a structure such as keyword-secondaryword-index.jpg
Use structured data for your content and include the image :
"name": "Reguleeritav kontorilaud",
"description": "A compelling descritpion",
Alt description and title should contain your keyword but it doesn’t seem to be a major ranking factor.
My hypothesis is that the content of the page itself gives the search engine enough context about the image. An image that is unrelated to the text around would be out-of-place and that might be a bad signal. The name of the file, if properly done contains already more specific information about the image. Alt and title are meant to be used if picture does not display and for assistive technology respectively.