UbuntuHacks
Book Description:
Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners...
Mile2’s C)PTE vs. CEH®
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH?
To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
Linux /etc/shadow File
This was Linux Shadow file for linux users file /etc/passwd
IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....
Database Data Structure
Data Independence
The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...
All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Hash Detector BTr3
Hash Detector BackTrack r3
/* To Detect what type of algorithm is used to make hash encrypted */
root@bt:~# cd /pentest/passwords/hash-identifier
root@bt:/pentest/passwords/hash-identifier# ls
...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Linux in a Nutshell, 6th Edition
Book Description:
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...






