||There was a vulnerability where a Firewire device, when plugged in, can overwrite anywhere in memory. What hardware protocol caused this?
||DMA or Direct Memory Access
||What is the hiding of a secret message within an ordinary message and the extraction of it at its destination called?
|History, Personality & Literature
||What was the name of the 1983 movie where Mathew Broderick played a young hacker who gained access to a government nuclear war simulator?
||In Microsoft Internet Explorer, which file stores information about a user’s browsing history such as URLs?
||the index.dat file
||In practical cryptography, what is the name of the functions that are embodied in a physical structure, that is easy to evaluate but hard to characterize.
||PUF or Physical Unclonable Function