A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Author: admin
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
A. Pakistan & India
B. Afghanistan & Iran
C. India & Mongolia
D. Pakistan & Afghanistan
A. 2002
B. 2003
C. 2004
D. 2005
A. Shanghai, China
B. Tashkent, Uzbekistan
C. Astana, Kazakhstan
D. Moscow, Russia