Posts by admin
21
Feb
it tends to protect the individual user since each workstation requires a specific software for the biometric identification as well as for the individual user. Despite the several advancement in system security there have challenges facing the implementation of the latest development trends. For example
the cost of installation of each biometric device on hardware as well their respective software’s tend to be costly especially on comp...
21
Feb
poorly designed or not protected. This is due to mobility issues
flooding issues and issues with header manipulation. Spoofing is a security threat common in IPv6 protocol. Port scanning is an attack ...
21
Feb
& Jamalipour
2009: 1). Firewall is a border control mechanism used to block outside or inside traffic or any unauthorized access from private networ...
21
Feb
to access phone number for the modem
and the password cracker for breaking weak passwords