Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
Google Search for Serial Key
Serial Key
If you want to use any software n software is asking to enter key and you don't have key.
What you will do now?
Buy ...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
UbuntuHacks
Book Description:
Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Represent Decimal > 8-Bit Notation
Denoting decimal ( Base 2 ) numbers into 8-Bit Binary Notation
eg. 255 in binary = 11111111
16 in binary = 00010000
SSL Installation on Webmin
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...





