Is it too much to expect an appropriate answer from Computer Science Engineering graduates for these questions, – What does 32-bit computer really mean? – What is word length? – What is the length of a byte? – What is the length of an IP address? – What is the hardware address? – What is […]

Read More →

Any message that appears to have come from a friend in the network is trusted by default. By this nature, social networking sites are the easy targets for worm writers to spread the attack. Also, behavioral analysis is possible by looking at enormous amount of content available. An attack that is targeted is thus possible, […]

Read More →