A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
Author: admin
A. Cracking
B. Jacking
C. Spoofing
D. Smarming
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
A. Pakistan & India
B. Afghanistan & Iran
C. India & Mongolia
D. Pakistan & Afghanistan
A. 2002
B. 2003
C. 2004
D. 2005