I want to start this post in which i want to share some seecurity computing knowledge. In which i will explain the working of av's, database security, software security, os security etc....
If this is not against the rules of bytes will i start writing further posts.....
Thanx
>> ALI <<
If this is not against the rules of bytes will i start writing further posts.....
Thanx
>> ALI <<
Comment