Answer:Weak session ID generation algorithm
Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.
It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.
Answer:
pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")
Explanation:
PGP encryption from the command line can be done using the following format:
- pgp --encrypt (input) --recipient (user) --output (output file)
Therefore, PGP command line syntax to encrypt the my-message.txt file for a specific user (Sean) and save the output as secret-message.txt.gpg is:
- pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")
C) End is the key that moves the insertion point to the end of data in a cell.