Computer Security (58)
Mobile Security (9)
Hacking (33)
Security AllOther (4) What is a table in computer?
I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?
Which payphones will a red box work on?
What are accessories in computer?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What laptops do hackers use?
What tools do real hackers use?
What is nis/yp?
What is meant by computer application?
Who is the most dangerous hacker?
What are the 3 types of hackers?
How do I access the password file under unix?
How do hackers hack passwords?
What is the most commonly used computer application?
What is the difference between a virus and a trojan?