Answer Posted / kesava reddy
A system that has been taken over using Remote Control
Software. Zombies are often used to send spam or to attack
remote servers with an overwhelming amount of traffic (a
Distributed Denial of Service Attack).
| Is This Answer Correct ? | 2 Yes | 14 No |
Post New Answer View All Answers
Explain what are the system calls used for process management?
Explain the system calls used for process management?
What is the condition required for dead lock in unix system?
What are the various schemes available?
Tell me set-user-id is related to (in unix)?
Explain the advantage of executing a process in background?
Which ipc is faster?
Max relax-able permission value with out giving write permission to others?
What is the very first process created by kernel?
Explain the initial process sequence while the system boots up?
What is the full form of ipc?
What are two different models of ipc differentiate both?
What are the various schemes available in ipc?
Explain how do you execute one program from within another?
What is fork()?