2 – Phase Commit Protocol
Commit Protocol
In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Linux in a Nutshell, 6th Edition
Book Description:
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
Hash Detector BTr3
Hash Detector BackTrack r3
/* To Detect what type of algorithm is used to make hash encrypted */
root@bt:~# cd /pentest/passwords/hash-identifier
root@bt:/pentest/passwords/hash-identifier# ls
...
Brave Summarizer takes on Bing and ChatGPT at the AI search results game
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...





