1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
9

Anyone bug bounty hunter ?​

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
5 0

Answer:

your question is full of doubted

You might be interested in
Did this technological advancement take away or create jobs? Overall, what was the contribution of this technological advancemen
mars1129 [50]
It took away jobs and made day to day tasks easier
3 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Windows organises information on computer using a
zhuklara [117]
The correct answer is b folder
6 0
3 years ago
Read 2 more answers
Is used to process certificates and private/public key information?
Luda [366]
<span>SSL is used to process certificates and private/public key information. </span>SSL stands for Secure Sockets Layer. It is cryptographic protocols <span> that creates a trusted environment and </span>provides communications security over a computer network. The SSL protocol is used for establishing encrypted links between a web server and a browser.
4 0
3 years ago
________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
Leviafan [203]

Answer:

Storage management

Explanation:

The programs that do this are known as Storage management programs. They are incredibly useful since they allow you to see which files are taking up the most amount of space as well as the importance that each file has on the system. Many of these programs have a different visual representation of the files such as pie charts or system blocks showing the percentage of space it is taking up. Everything in these programs is made to help the end-user visualize and analyze their data thoroughly.

7 0
3 years ago
Other questions:
  • A page-replacement algorithm should minimize the number of page faults. We can achieve this minimization by distributing heavily
    14·1 answer
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • Please answer quick:))))
    7·1 answer
  • An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
    10·1 answer
  • How do headphones work? (From pc)
    8·1 answer
  • The latest form of personal communication that most resembles a public journal is a _____.
    15·2 answers
  • Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
    12·1 answer
  • Jack used primarily web sources for his informative speech about gun control. however, his over-reliance on the web site sponsor
    11·1 answer
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • Which of the following tells the computer hardware what to do? A Information B) Software Procedures D People
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!