Internet/Network Security/Expert Profile

Denis Mello

On Vacation
returns 12/19/2016

I understand the principles and the application of Network managament, from the OSI schema to mechanisms of detection, intrusion, security issues and vulnerabilities, how-to-attack and defend from crackers. I always look to be updated with the latest security holes. I also know OS like Windows 2k, 2k3, Linux, HP-UX and Solaris as best as other platforms.

Past/Present Clients

General Motors, VIVO, Petrobras, OptiGlobe, Brazil Telecom, Hewlett-Packard.

This expert accepts donations:      

Average Ratings

Recent Reviews from Users

Read More Comments

    K = Knowledgeability    C = Clarity of Response    P = Politeness
Gabriel02/01/15101010Thanks a lot for such a good .....
Cameron01/18/15101010Yes it did help me, and I .....
Choo01/05/15101010Alright, thanks.
Choo01/04/15101010Hey, thanks. And a very speedy reply .....

Recent Answers from Denis Mello

2015-02-04 Implementing unicode characters in strong password.:

Hi, Prashant.    I pretty sure that it is possible.  I believe that you are a developer and is going to develop some functions to achieve that.  Well, to achieve it you also need to consider at least 10

2015-02-01 Trojan:

Hi, Gabe.  Not a problem.    There is no specific answer in terms of recovering.  Depending on the tool you choose, the steps for recovering are different.    After the process comples, you will have to

2015-01-29 Trojan:

Hi, Gabriel.  Yes, there a few options.  You may use some tools that are designed to recover data.  It takes time and sometimes, depending on the way data was deleted, you can get corrupted results.  

2015-01-20 McAfee:

Henry. I'm sorry for the delay.    No. Installing McAfee is not enough, although it is a very good option.  Installing anti-malware is a good complement. Some add-ons in your browser will help up too.

2015-01-15 LISTEN TO ME:

Hi, Cameron.  Sure I can explain it to you.  First of all. What PODCAST refers to?  Pod-Personal On Demand  The word is a neologism and portmanteau derived from "broadcast" and "pod" from the success of


Ask A Question

Internet/Network Security

All Answers

Answers by Expert:

Ask Experts


©2016 All rights reserved.