Computer Security (58)
Mobile Security (9)
Hacking (33)
Security AllOther (4) I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?
2032I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?
1648Configuring ACLs is an important part of working with the IOS Firewall. What wildcard masks are replaced in ACLs by the words host and any?
1 2087
What is Exfiltration?
What is a black box?
What is a hacking loop?
What is nis/yp?
How would you login to Active Directory from a Linux or Mac box?
explain step by step role design process in sap security
What is dora process in DHCP and how it works?
What tools do real hackers use?
What is a driver in computer?
What is a blue box?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What is data source in computer?
What is the most commonly used computer application?
Do blue boxes still work?
What is a red box?