Normalization

0
It deals with the database design problem Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...

What Is Network Topology And What Are Its Different Types?

0
What is Network Topology? Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...

Mile2’s C)ISSO vs. ISC’s CISSP®

0
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

IPv4 Classes

0
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...

Acunetix v10.5 released

0
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...