Computer Security (58)
Mobile Security (9)
Hacking (33)
Security AllOther (4)
What is a red box?
what is the use of scul transaction in sap security in ecc server?
What is a table in computer?
What is Exfiltration?
How do I build a red box?
How do I modify the irc client to hide my real username?
What is password shadowing?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
What is nis/yp?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
What is a hacking loop?
Is a console a computer?
What software do hackers use?
How do I fake posts to usenet?
How do I access the password file under unix?