What tool would be best used to have the LM hashes computed for all possible permutations of the administrator password?
How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of his attack going undetected by the IDS?
Which built-in functionality of Linux can control network traffic and also perform stateful inspection of traffic going into and out of the DMZ?