1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
7

LOLer was chatting online with l33ter. "I can't believe how lame some people are! :) I can get into any system by checking out t

he company website to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password." LOLer is a ___, and the fraud he is describing is ___.
Computers and Technology
1 answer:
Mkey [24]3 years ago
5 0

Answer:

The answers are <em>"</em><em>hacker </em><em>and </em><em>hacking</em><em>"</em>

Explanation:

LOLer is an security hacker who uses computer bugs and other exploits to break into a company or personal network system by using their personal ingenuity and other accesses. Thus the process he described of getting into the company server details and getting peoples IP addresses and details on the company involves security hacking of the company network.

You might be interested in
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
castortr0y [4]

Answer:

The correct option to the following question is option (B). e-business.

Explanation:

E-business is stands for the Electronic business.

E-business is the business which is conduct by the uses of the internet, Web, extranet or intranet, etc.

E-business is also known as the online business where online transactions take place.

E-business facilitates our customers that the selling and the buying of the goods between the consumers and the merchants.

7 0
3 years ago
What is the top anime shows? &lt;3
LenKa [72]

Answer:

This is personally based on my opinion.

My top 10 favorites

Toradora

Darling in the franxx

Lucky Star

My Melody

Death note

Attack on titans

One piece

The Promise neverland

Kaguya-sama: love is war

Black cover

4 0
3 years ago
Read 2 more answers
Advertising andpublicity are used to:
WINSTONCH [101]

Answer:

d. All of the given options

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

<u>Advertising and Publicity</u> is used for many reasons.

Retail Companies use advertising and publicity to promote their products and in term increase sales of that product when it hits the shelves.

Meanwhile, other companies such as Law Firms use advertising and publicity create awareness for their law firm and communicate with customers over high profile case etc.

Therefore, the answer is all of the above.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
If the contents of encrypted file1.nc and encrypted file3.nc are different, but the original file1 and file3 are the same, and y
Over [174]

Answer:

The Difference is because of the salt added to the password before hashing or encrypting it.

Explanation:

The Difference is because of the salt added to the password before hashing or encrypting it.

Salts are random data used to mention uniqueness. Suppose if two users have same password for the same system. By adding Salt to the password makes it unique in the crypto system. Its a added security layer which can safeguard the passwords or hashed data in the keystore or storage.

Salt can be prepended to the password or appended to the password.

Suppose the password is “stuti” then its SHA256 HASH value is <u><em>“4beb1eb6f438495eede7b14ac0d2b955636a49412cd4eb5714341f5716144954”</em></u>

So, if we add a salt with random string <em>brainlysalttest</em> then its SHA256 HASH value is <u><em>“5429e85778f1b9f493da637848f253dedf3edbfbb72782d43eb7337cee45ab0c”</em></u>

If we append the salt <em>brainlytestsalt</em> to the same password and hash it using SHA256 then its hash value is : <u><em>“3919b677d80ae0da2b58f70b464f6492670ccffee78cf52972c6983995ed8f52”</em></u>

So clearly Salting to the password and Hashing the salted password will make the difference and also unique.

3 0
3 years ago
How would you define the rule of thirds?
mixer [17]

A pronciple of composition used fir centuries by artists and photographers or it is a method when used to frame a composition properly

8 0
3 years ago
Other questions:
  • Which of the following is the rarest and most valuable mineral ore among the native elements?
    13·1 answer
  • A Web ____ is a software program that retrieves the page and displays it. Select one:
    5·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
    5·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • 5. Which one of the following statements is true for spell checkers? A. Most spell checkers flag inappropriate word usage. B. A
    5·1 answer
  • Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he
    15·1 answer
  • What is the difference between autofocus and autocomplete
    8·1 answer
  • What is the difference between algorithm and program?
    10·1 answer
  • A simple C program to find the logarithm of any number in any base.....​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!