in network security,how we identified threat?some one say we
found threat according to it's signature,but how we get
signature or pattern of the virus?
No Answer is Posted For this Question
Be the First to Post Answer
what is the difference between set and append?
how sap is different from other software ?
details description on this mantis? who is founder of this mantis?
you have a computer with 80GB hard disk and ubuntu 8.04 is installed on entire hard disk.now you have to create a seprate partition for windows OS and install win XP as dual boot.write down the steps involved along with the commands
1 Answers Anand Group, Indian Navy, TCS,
how to swap all the values without using temporary variable. tha values r a = 20, x=60 and p=2.
5 Answers DST Global Solutions, iGate,
how to write the fallowing code in java? 1 4 9 16 25 36 49 64 81 100
what is different between kenerl mode and user mode?
What are scrubbing procedures in SAS
what is log files in qtp what is use
Data Structure: How many comparisons are necessary to find the largest and smallest of a set of n distinct elements?
What is the worst case of AVL tree?
how we can call xml file in java file using Android platform?