2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
Database Users

Database Users

0
Database End Users End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...

Brave Summarizer takes on Bing and ChatGPT at the AI search results game

0
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...

DBMS Client/Server Computing

0
Client/Server Architecture for DBMS Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...

Enable Right Click on WebPage

0
Click "Tools"->"Internet Options" Click the "Security" tab Click "Custom Level" Scroll down to the "Scripting" section Set "Active Scripting" to "disable" Click "Ok"

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

All About Tor

0
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties: Your internet service provider, and...