IPC Section for Cyber Laws

0
IPC Section for Cyber Laws Indian Penal Code for IT World Section 378,379. Theft of Computer  Hardware Section 464. Making a False Document Section 468....

Brave Summarizer takes on Bing and ChatGPT at the AI search results game

0
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...

DBMS vs FPS

0
DBMS vs FPS ( File Processing System) Flexibility Because programs and data are independent, programs don’t have to be modified when types of unrelated data...

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...
linux

Linux Server Hacks

0
Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000
Install SSL on Webmin

SSL Installation on Webmin

0
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...