Acunetix v10.5 released

0
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow

IPC Section for Cyber Laws

0
IPC Section for Cyber Laws Indian Penal Code for IT World Section 378,379. Theft of Computer  Hardware Section 464. Making a False Document Section 468....

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

Database Data Structure

0
Data Independence The ability of modifying a schema definition in one level without affecting a schema definition in a Higher Level is called Data...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
Character Encoding

Character Encoding

0
URL Character Encoding  Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F This complex %20 sign are nothing but Character Encoding in Hex form.    Special             Hex                 Ascii...

What is Bandwidth / Traffic

0
BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...