What can be done to protect the system from overflow exploits?
No Answer is Posted For this Question
Be the First to Post Answer
command used to synchronize changes done in /etc/passwd to /etc/shadow file?
Root mirroring in SVM, in Veritas ?
4 Answers HP, IBM, Satyam, Wipro,
How do you break the root password?
what are the ILOM commands are used to troubleshooting sunv490 server on ILOM console mode?
how to create 100 users at a time in solaris?
Explain what is multi homed system?
What is VTS
How to check OBP version?
Difference between resource pool and project in containers
How can we find memory leak in Soalris ?
Hi friends this is rakesh recently i went to an interview there they asked me what is the port number using to connect telnet from one system to another system and what deamon is used to connect telnet.
How many types of file system?