What is the difference between a Black Hat and a White Hat?
Answer / chaitanya
This particular question can lead into a major philosophical debate about freedom of information, and if something is implemented in a deliberately broken way it isn’t actually breaking into it, etc etc. The one I’ve heard the most is the classic Jedi example – same tools, different ideologies. Personally, with the people I know that have worked on both sides of the line it comes down to this – the difference between a Black Hat and a White Hat .
| Is This Answer Correct ? | 1 Yes | 0 No |
How many security protocols available?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?
What is a table in computer?
You need to reset a password-protected BIOS configuration. What do you do?
How do you protect your home Wireless Access Point?
What is a driver in computer?
How would you login to Active Directory from a Linux or Mac box?
Does indexing slow down computer?
What is your opinion on hacktivist groups such as Anonymous?
Is a console a computer?
You see a user logging in as root to perform basic functions. Is this a problem?