Recent orders

where retransmission or recording of information in the packets is done using network. This threat involves programs that require authentication sequence. This is so because an intruder could replay a message authentication in a sequence to have access to system. The packet replay is not undetached easily. It could be prevented through the use of time stamping or sequence counting(Bishop

2003:68).

women will use the names of their husbands or children. They attackers could also guess words with the use of a dictionary (Sun et al

2005:14).

the hidden code also runs. This may then delete files which may destroy the computer. Most of these are spread through attachments in e-mail. For example Melissa

a virus which was able to lead to service denial in the entire world in 1999.