answersLogoWhite

0


Best Answer

Two ways to prevent vulnerable software attacks include using a high quality anti virus that helps detect theses attacks and only using trusted websites and software.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can you list two ways to prevent vulnerable software attacks?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

List precautions that might have prevented this attack?

Many precautions could have been made to prevent the attacks on September 11, 2011. More thorough and stricter airport security, negotiation tactics and a better organized system of rescue would have helped prevent these attacks from being so catastrophic.


What is the Spotted Turtle ranking on the IUNC red list?

Vulnerable


What are some software protocol?

software protocol list


Where can I find a list of software solutions?

You can find a list of software solutions on Cnet.com. This site will give you a list and provide feedback on the software of interest. There is even video to help you make your decision.


Explain what a systems software and list the example of systems software?

software eg


What are the software trends in the present time?

Make a list of at least three useful Open Source Software that are used in Software development. List the basic features of each of these software.


Where can one find the source code for the ebaymotor?

Ebay Motor's source code can only be found by contacting them directly. It is not available online to just anyone as it could leave them vulnerable to online attacks. A list of commands might be available on their website but to get exactly what your looking for you must contact them.


Is there a list of all software companies in Europe?

There are a huge amount of software companies in Europe, so it would be impossible to list them all.


Do gray wolves eat people?

Although attacks are rare, they do occur. Click on this link for a list of such attacks in North America.


How many software companies in delhi list that?

1. Mukunda Software Inc


List two examples of categories for both passive and active network security attacks?

passive attacks : footprinting, trashing active attacks : sniffing, social engineering


Is xenosaurus extinct?

No, the xenosaurus is not extinct or on the endangered species list but listed as vulnerable for conservation status.