In the first six months of 2008, what percentage of sites serving malicious coding were legitimate sites that had been hacked?
Secret Word of the Day
Who’s in your digital wallet? This type of exploit is used by malicious hackers to present a faked or modified website to the user as if it were legitimate. What’s the secret word?
IT Acronym Challenge
CRAM is the two-level scheme for authenticating network users that’s included in the hypertext transfer protocol. What does CRAM stand for?