Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...

The Power Of Social Networking

0
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...

Google Search for Serial Key

0
Serial Key If you want to use any software n software is asking to enter key and you don't have key. What you will do now? Buy         ...

DBMS Client/Server Computing

0
Client/Server Architecture for DBMS Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...

Database Transaction

0
Database Transaction Transaction is a Collection of operations that forms a single logical unit of work. A transaction is an atomic unit of work that...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....
linux

Linux Server Hacks

0
Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd

Brave Summarizer takes on Bing and ChatGPT at the AI search results game

0
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...