Computer Security (58)
Mobile Security (9)
Hacking (33)
Security AllOther (4)
What tools do real hackers use?
How do I build a red box?
Is a console a computer?
What are some irc channels of interest to hackers?
How do I break out of a restricted shell?
How would you login to Active Directory from a Linux or Mac box?
What is nis/yp?
What is a black box?
Which payphones will a red box work on?
What is the most commonly used computer application?
What software do hackers use?
What is database in a computer?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What laptops do hackers use?
explain step by step role design process in sap security