Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...

Presentation on TOR

0
This presentation is upon TOR Project. If you need any assistance feel free to contact us.  

Make Write Protection USB/SDCARD

0
Write Protection USB or SDCARD C:diskpart DISKPART> list disk /* Displays the list of disk available */ DISKPART> select disk 1  /* Select your desired Drive */ DISKPART> attributes disk...

DBMS Client/Server Computing

0
Client/Server Architecture for DBMS Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...

SSL Handshake (443)

0
SSL Handshake (443 port of server at which SSL connection is made)                                                                         Client  (Browser)    ---------------------Client Hello Msg.------------------------------------> Server ·         Highest SSL Version ·         Compression (SHA1, SHA1-DES) ·        ...
ubuntu

UbuntuHacks

0
Book Description:  Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...