Computer Security (58)
Mobile Security (9)
Hacking (33)
Security AllOther (4) What is an easy way to configure a network to allow only a single computer to login on a particular jack?
1 7159You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
1 5145You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?
1 4375You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
1 3338
Which payphones will a red box work on?
How do I modify the irc client to hide my real username?
How do I crack vms passwords?
How do I build a red box?
How do I break out of a restricted shell?
How do I crack unix passwords?
What is a black box?
Is a console a computer?
What is a driver in computer?
What is Exfiltration?
What laptops hackers use?
What is the most commonly used computer application?
How do I access the password file under vms?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What are the most common computer applications?