Software Interview Questions
Questions Answers Views Company eMail

Are one-time pads really unbreakable?

1446

What are good sources of randomness?

1496

How to encrypt swap?

1589

shall we use a journalling filesystem on top of /dev/loop?

1648

How do I change the password / the cipher?

1372

How to make backups?

2036

What are IP Tunnels?

1656

what is CBC?

1828

what is ECB?

1765

Is ECB cipher mode faster than CBC ?

1775

Is the IAIK-JCE implementation tested on platforms like SUN solaris, Macintosh (OS 7.5, 8.0), HP-UX (10.x)?

1976

Does IAIK support RC4 ? Is the code written the same way as for RC2 ?

1419

What is a product cipher?

1980

What makes a product cipher secure?

1673

What are some group-theoretic properties of product ciphers?

1 1995


Un-Answered Questions { Software }

What is use of list comprehension ?

477


What are the pseudo classes on tags?

261


How you can implement ajax in mvc?

1


Do you need an alignment after replacing struts?

524


What is the benefit of having jdbcrowset implementation?

539






How do you define a new company code?

612


What is a web container and what is its responsibility?

531


How to check null and undefined in typescript?

1


What salary are you seeking at Jimmy Johns?

664


Explain about lprm job number?

645


What are the difference between snow flake and star schema?

514


what is INFORMATICA TESTING process

1842


What is the need for lock management in a typical sap system?

518


What is the meaning of variable in research?

560


Can you explain how can os authentication be connected with weblogic jdriver for oracle and connection pools?

519