in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More Programming Languages AllOther Interview Questions

Given: coordinates of rectangle-> left bottom and right top points. the rectangles create a hole.Find the maximum area of the hole. eg. 4 rectangles create a hole in between. find its area.

0 Answers   Manhattan,


how to run servlets in eclipse 3.3.2....if we choose file->new->servlet then after that it is showing javax.servlet.* ...cannot be resolved.......to avoid this error any external jar file is to be added? please help me regarding this issue........thank u

2 Answers   IBM,


1. How many jobs can we write in a single file? 2. How many maximum members can exist in a single partition data set(pds) in jcl?

0 Answers   Steria,


What are the Advantages of HashMap over Vector?

1 Answers  


WHAT IS MAIN IMPORTANT THING IN SOFTWARE?

0 Answers   Infosys,






what is the software to run the GSM gate opener program

0 Answers  


if heap sort contains n elements, no of comparsions required are

2 Answers   Hughes,


One boy has to climb steps. He can climb 1 or 2 steps at a time. Write a function that will returns number of way a boy can climb the steps. Int WaytoSteps(int n) (eg:- suppose number of steps is n=4 ,the function will return 5 (one-one-one-one ,one-one-two, one-two-one-,two-one-one, two-two)

0 Answers   Persistent,


how to hide prompts

0 Answers  


Piggy backing is a technique for a) Flow control b) sequence c) Acknowledgement d) retransmition

17 Answers   Fast Booking, HCL, Lucent, NIC,


When we have two versions of the dot net installed how does the compiler know which version of DLL it has to select to an application.

0 Answers   Tesco,


4.Write a program to get the string in array and print that? or Without using loop print the array.

3 Answers  


Categories