Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?
This kind of password cracking method uses word lists in combination with numbers and special characters:
_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.