MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...
Normalization
It deals with the database design problem
Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
Oracle Inside
Oracle Architecture
Basically, these are two main components of ORACLE Database Architecture.
Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Make Write Protection USB/SDCARD
Write Protection USB or SDCARD
C:diskpart
DISKPART> list disk
/* Displays the list of disk available */
DISKPART> select disk 1
/* Select your desired Drive */
DISKPART> attributes disk...
Linux Password Stored Format in /etc/passwd
This was Linux users file, to understand linux password file /etc/shadow
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
DBMS vs FPS
DBMS vs FPS ( File Processing System)
Flexibility
Because programs and data are independent, programs don’t have to be modified when types of unrelated data...
Summer Internship 2017
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...




