Hackers and Viruses 2

1)Who is the author of the book "The Art of Intrusion "?

2)Identify this hacker of Indian origin?

3) The famous Sprawl trilogy "Neuromancer (1984), Count Zero (1986), and Mona Lisa Overdrive" has been written by whom?

4) "X' is a hacking technique designed to conceal the compromise of a computer's security, and can represent any of common program. Identify X?

5)Identify him

6)His first hacking endeavor was to make free long-distance calls by creating “blue boxes” to bypass phone-switching mechanisms, and some of his college friends claimed that he had called the Pope, pretending to be Henry Kissinger. Identify him?

   Challenge of the Super Friends.jpg

8)"X" is a term coined to describe the study, experiment  and  exploration of  telecommunication systems, such as equipment and systems connected to public telephone networks. 
What is the term?

9)What is the significance of this pic?

10)It is a term understood to mean the art of manipulating people into performing actions or divulging confidential information.It is very frequently used for hacking purposes. What is the term?


Popular posts from this blog

Quiz Time 129

TCS IT Wiz 2013 Bhubaneswar Prelims

The 5 hour start-up: BrownBagBrain