Instrumental in tracing the Melissa virus's origins were unique hardware numbers, known as ________, that were stored in Office 97 document files

Fill in the blank(s) with correct word

GUIDs

Computer Science & Information Technology

You might also like to view...

The Each...Next statement is used with the debugging process

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is most accurate concerning virtualization security?

A. Only hypervisors can be secured, not the underlying virtual machine. B. Virtual machines by nature are always insecure. C. Virtual machine is developed under a hypervisor and utilizes the underlying physical hardware. D. Virtual machines are only secured by securing the underlying hardware infrastructure.

Computer Science & Information Technology