A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Author Archives: Rana Tahir
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
A. Time-related bomb sequence.
B. Virus.
C. Time bomb.
D. Trojan horse.
A. Memory or disk space.
B. Time.
C. CD drives space.
D. CD-RW.
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus