DBMS vs FPS
DBMS vs FPS ( File Processing System)
Flexibility
Because programs and data are independent, programs don’t have to be modified when types of unrelated data...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
Linux Server Hacks
Book Description:
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
Top 16 Hackers Friendly Linux OS
16 Hackers Friendly Linux OS
Kali Linux OS:
One of the most advanced penetration-testing platform developed by offensive security. Its flavors are available in both...
cPanel Security Team: glibc CVE-2015-7547
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Best DNS Server -> Increase Internet Speed
List of Top 10 Best DNS Server : To increase Internet Speed
Google:
Preferred DNS server - 8.8.8.8
Alternate DNS server - 8.8.4.4
Norton DNS:
Preferred...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...



