logo

CuriousTab

CuriousTab

Discussion


Home Interview Technology Comments

  • Question
  • What are the ways in which attackers can infiltrate the system?


  • Correct Answer
  • - Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred - If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker - The processes are not given proper permissions so that the password can be changed by using the ?passwd? command to change the password of the system - This also authenticates the user for accessing the system and the files on it containing the data - The program that is used in the operating system doesn?t follow the principle of least privilege and lead to security issues 


  • Technology problems


    Search Results


    • 1. What are the security features being provided in web security?
    • Discuss
    • 2. Write a program to fix the error being produced by the Infinite file?
    • Discuss
    • 3. What is the use of Infinite file in Web security?
    • Discuss
    • 4. What is the Fail-safe approach?
    • Discuss
    • 5. What are the principles in providing the security for the computer programs?
    • Discuss
    • 6. How E-commerce works?
    • Discuss
    • 7. List the major benefits of E-commerce.
    • Discuss
    • 8. Distinguish between Static vs. Dynamic HTML
    • Discuss
    • 9. Explain three important components of Dynamic HTML authoring - Positioning, Style modifications and Event handling
    • Discuss
    • 10. Explain about struts dispatch action in DHTML
    • Discuss


    Comments

    There are no comments.

Enter a new Comment