Why would you want to use SSH from a Windows pc?1 5130
What’s the difference between Symmetric and Asymmetric encryption?1 2635
What is SSL and why is it not enough when it comes to encryption?1 5319
How would you find out what a POST code means?1 2765
What is the difference between a Black Hat and a White Hat?1 2294
You need to reset a password-protected BIOS configuration. What do you do?1 2299
What is XSS?1 2260
What are salted hashes?1 3641
What do you think of social networking sites such as Facebook and LinkedIn?1 2498
What are the three ways to authenticate a person?1 4604
How would you judge if a remote server is running IIS or Apache?2 7003
What is data protection in transit vs data protection at rest?1 3056
You see a user logging in as root to perform basic functions. Is this a problem?1 4396
How do you protect your home Wireless Access Point?1 2286
What are some irc channels of interest to hackers?
What is meant by computer application?
How do I fake posts to usenet?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
How do I break out of a restricted shell?
Who is the best hacker in the world?
What is a red box?
What is a ringback number?
What is a table in computer?
What software do hackers use?
What is a black box?
What's Security Tests
What tools do real hackers use?
What is nis/yp?
I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?