Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is secured sucket layer and what is the requirement of
its in networking

Answer Posted / bill gates

evryone is reuning name of ma company n ma fake too
available here......its bill gates here......roflmaoooooo

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the types fo ddos attacks?

1097


What is the role of single sign on in authentication technologies?

1004


How does ransomware work?

1036


What do you do when you get blue screen in a computer? How do you troubleshoot it?

1033


Why should you care about the OSI Reference Model

1017


What is utm firewall?

1047


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1610


What are the types of phishing attacks?

1084


What type of network do you use at home?

1008


What are the types of LAN cables used? What is a cross cable?

979


What is multicasting?

955


What is http flood?

990


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

901


What is frame relay, in which layer it comes

1074


What factors would you consider before deploying a web intrusion detection system?

952