IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....
What is Bandwidth / Traffic
BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
Normalization
It deals with the database design problem
Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
Making Sense of NoSQl
Book Description:
If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...
Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
Database Keys
Keys
A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...
Linux Password Stored Format in /etc/passwd
This was Linux users file, to understand linux password file /etc/shadow



