Zombie computer is a computer under grab of a spammer who has infected the computer connected to a network with malware so that it facilitates as a tool of a spammer by sending out hundreds of emails from the owner’s email address. Therefore, an innocent user’s computer sends hundreds of spam messages without the awareness of the user. The spammers arrange zombie computers into small teams known as botnets. These botnets send spam such as phishing attempts, viruses and worms.Computers become element of a zombie network through malicious application (malware) that is unknowingly installed by users or automatically installed through ... Read More
A Password attack contains multiple techniques used by hackers to steal passwords. There are some password attacks are as follows −Brute-force − It is method in which a hacker attempt to guess a password by frequently entering in new set of words and phrases compiled from a dictionary to steal the password. It is making complex to guess usernames and passwords can avoid it.Packet sniffers − Packet sniffers are the technique used to capture data streams over a network to acquire sensitive information like usernames, passwords, credit card numbers, etc. Therefore, packet sniffers are also malicious forms of threats to ... Read More
Suppose we have a number n. Consider, first n natural numbers. We have to split them into two sets A and B such that each element belongs to exactly one set and the absolute difference between the sum of elements in A and sum of elements in B is minimum, and find that difference.So, if the input is like n = 5, then the output will be 1, because if we make A = {1, 3, 4} and B = {2, 5}, then the sum values are 8 and 7, so difference is 1.StepsTo solve this, we will follow these ... Read More
Suppose we have an array A with n elements. Let, Amal climbs the stairs inside a multi-storey building. Every time he climbs, start counting from 1. For example, if he climbs two stairways with 3 steps and 4 steps, he will speak the numbers like 1, 2, 3, 1, 2, 3, 4. In the array A, the numbers are representing stair numbers said by Amal. We have to count the number of staircase did he climb, also print the number of steps in each stairway.So, if the input is like A = [1, 2, 3, 1, 2, 3, 4, 5], ... Read More
Attacks can be defined by the relationship between threat, vulnerability, and damage. It can prevent attacks from viruses and worms, a current version of antivirus software must be used. Security threats associated with computer crime or abuse such as −Computer Viruses − The computer virus defines specifically as malware adding malicious programs into existing reports or programs. It circulates itself by several means. Viruses are treated as the general type of network security threat. Almost 90% of viruses are circulating through a connection on e-mails. However, a cautious user action can avoid the circulate of virus because virus needed a ... Read More
Security Information Management (SIM) products are also defined as Security Information and Event Management or Security Event Management. It can automate the manual procedure of collecting security-specific event-log data from file systems, security appliances, and multiple network devices.Security Information Management (SIM) is a heterogeneous product, and therefore SIM rollouts contain complex technical integration and political negotiations. The structure of the SIM tool doesn’t imply creating a lot of difference either.Even if a solution doesn’t need an installed agent to get data from a system, it still generally needed a configuration change or privileged account to receive the data it needs ... Read More
There are various advantages of Information Management Security which are as follows −MIS is a formal system for supporting management with precise and timely data necessary for decision-making. The system supports data on the past, present, and project future and on appropriate events within and external the organization.It can be represented as a planned and integrated system for gathering relevant records, transforming them into the right data, and supplying the same to the concerned administration. The objective of MIS is to support the right data to the right person at the right time.The advantage of a Security Information Management (SIM) ... Read More
Suppose we have an array A with n elements. There are n soldiers standing on a circle. For ith soldier, the height is A[i]. A reconnaissance unit can be made of such two adjacent soldiers, whose heights difference is minimal. So each of them will be less noticeable with the other. We have to find the indices of the pair of soldiers that can form a reconnaissance unit.So, if the input is like A = [10, 12, 13, 15, 10], then the output will be (5, 1).StepsTo solve this, we will follow these steps −n := size of A D ... Read More
Security information management is a type of software that automates the set of event log data from security devices, including firewalls, proxy servers, intrusiondetection systems, and anti-virus applications. The goals of Security Information Management are to avoid interruptions to business events and provide the correct and secure services of computer and network facilities.All Security Information Managements gather data from the sources inside the network. Some will gather data from outside sources as well, ranging from public threat recognition services to proprietary correlation networks. Security Information Management, to a high extent, adds value with its capacity of discovering patterns in network ... Read More
Suppose we have an array A with n distinct elements, and another number x. There are n pieces of gold. The ith gold weight is A[i]. We will put this n pieces on weight scale one piece at a time. But the scale has an unusual defect: if the total weight on it is exactly x, it will explode. We have to check whether we can put all n gold pieces onto the scale in some order, without exploding the scale during the process. If we can, find that order. If not possible, mark "IMPOSSIBLE".So, if the input is like ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP