Answer Posted / kesava reddy
A system that has been taken over using Remote Control
Software. Zombies are often used to send spam or to attack
remote servers with an overwhelming amount of traffic (a
Distributed Denial of Service Attack).
| Is This Answer Correct ? | 2 Yes | 14 No |
Post New Answer View All Answers
Explain how do you execute one program from within another?
Explain what is the process id for kernel process?
What is the very first process created by kernel?
What is i-node numbers?
Explain the advantage of executing a process in background?
Max relax-able permission value with out giving write permission to others?
Explain the initial process sequence while the system boots up?
Explain a zombie?
What are two different models of ipc differentiate both?
How to write the program on full-duplex communication on bidirectional?
What is ipc port?
Which ipc is faster?
What is ipc in unix?
What are the various schemes available?
Please describe the initial process sequence while the system boots up?