What are the properties of universal trojan horses?
Answer / amitmalik(amity)
fluctate the screen
opening of unwanted ports
in/out of cd rom without any commond
restart system again and again..
| Is This Answer Correct ? | 3 Yes | 0 No |
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What a security mean in your sense?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
How does phishing work?
What is network access control?
What is a security policy?
How do I recover My Hotmail Account without a phone number and email?
What is ospf protocol
What are the different types of network security?
How do we test for stateful packet in firewall ? Do we need scripts written for this ?
What are major types of networks and explain