IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
EasyApache

EasyApache 21 February 2017 Maintenance Release

0
cPanel, Inc. has released EasyApache 3.34.12 with Apache version 2.2.32. This release addresses vulnerabilities related to CVE-2016-8743 and CVE-2016-5387. We strongly encourage all Apache...

Make Write Protection USB/SDCARD

0
Write Protection USB or SDCARD C:diskpart DISKPART> list disk /* Displays the list of disk available */ DISKPART> select disk 1  /* Select your desired Drive */ DISKPART> attributes disk...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...
Install SSL on Webmin

SSL Installation on Webmin

0
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...

Presentation on TOR

0
This presentation is upon TOR Project. If you need any assistance feel free to contact us.