DBMS Client/Server Computing

0
Client/Server Architecture for DBMS Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...
linux

Linux Server Hacks

0
Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...

IPC Section for Cyber Laws

0
IPC Section for Cyber Laws Indian Penal Code for IT World Section 378,379. Theft of Computer  Hardware Section 464. Making a False Document Section 468....
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...

Presentation on TOR

0
This presentation is upon TOR Project. If you need any assistance feel free to contact us.  
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

Database Data Structure

0
Data Independence The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...

IPv4 Classes

0
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...

cPanel Security Team: glibc CVE-2015-7547

0
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...

Database Keys

0
Keys A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...