Normalization
It deals with the database design problem
Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
Linux /etc/shadow File
This was Linux Shadow file for linux users file /etc/passwd
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...
All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
Linux in a Nutshell, 6th Edition
Book Description:
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Hacking is crime or not?
Hacking:
Is an art of gaining unauthorized access into any system either by hook or by crook!
This is the definition what everyone think. But according to...
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
EasyApache 21 February 2017 Maintenance Release
cPanel, Inc. has released EasyApache 3.34.12 with Apache version 2.2.32. This release addresses vulnerabilities related to CVE-2016-8743 and CVE-2016-5387. We strongly encourage all Apache...






