All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Oracle Inside
Oracle Architecture
Basically, these are two main components of ORACLE Database Architecture.
Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
Database Keys
Keys
A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...
Linux Password Stored Format in /etc/passwd
This was Linux users file, to understand linux password file /etc/shadow
Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
IPv4 Classes
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...



