Why would you want to use SSH from a Windows pc?1 3038
What’s the difference between Symmetric and Asymmetric encryption?1 1570
What is SSL and why is it not enough when it comes to encryption?1 4040
How would you find out what a POST code means?1 1548
What is the difference between a Black Hat and a White Hat?1 1351
You need to reset a password-protected BIOS configuration. What do you do?1 1261
What is XSS?1 1236
What are salted hashes?1 1162
What do you think of social networking sites such as Facebook and LinkedIn?1 1414
What are the three ways to authenticate a person?1 2940
How would you judge if a remote server is running IIS or Apache?2 3554
What is data protection in transit vs data protection at rest?1 2004
You see a user logging in as root to perform basic functions. Is this a problem?1 2472
How do you protect your home Wireless Access Point?1 1183
What is a ringback number?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
What is a black box?
What are some irc channels of interest to hackers?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What is a red box?
What is a hacking loop?
How do I crack vms passwords?
What is dora process in DHCP and how it works?
What's Security Tests
What is the difference between a virus and a trojan?
I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?
What is a trojan/worm/virus?
Which payphones will a red box work on?
How do I crack unix passwords?