Oracle Inside
Oracle Architecture
Basically, these are two main components of ORACLE Database Architecture.
Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
2 – Phase Commit Protocol
Commit Protocol
In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
Best DNS Server -> Increase Internet Speed
List of Top 10 Best DNS Server : To increase Internet Speed
Google:
Preferred DNS server - 8.8.8.8
Alternate DNS server - 8.8.4.4
Norton DNS:
Preferred...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
The Power Of Social Networking
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...


