Amity-Gif

Amity YOUTH FEST 2017

0
Amity Youth Festival 2017 Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...

Enable Right Click on WebPage

0
Click "Tools"->"Internet Options" Click the "Security" tab Click "Custom Level" Scroll down to the "Scripting" section Set "Active Scripting" to "disable" Click "Ok"

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...

DBMS vs FPS

0
DBMS vs FPS ( File Processing System) Flexibility Because programs and data are independent, programs don’t have to be modified when types of unrelated data...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...

Acunetix v10.5 released

0
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...

DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...