IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....
The Power Of Social Networking
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
Presentation on TOR
This presentation is upon TOR Project.
If you need any assistance feel free to contact us.
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...
DBMS vs FPS
DBMS vs FPS ( File Processing System)
Flexibility
Because programs and data are independent, programs don’t have to be modified when types of unrelated data...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Summer Internship 2017
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
Brave Summarizer takes on Bing and ChatGPT at the AI search results game
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...




