Linux Server Hacks
Book Description:
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
DBMS vs FPS
DBMS vs FPS ( File Processing System)
Flexibility
Because programs and data are independent, programs don’t have to be modified when types of unrelated data...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
Presentation on TOR
This presentation is upon TOR Project.
If you need any assistance feel free to contact us.
UbuntuHacks
Book Description:
Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
Make Write Protection USB/SDCARD
Write Protection USB or SDCARD
C:diskpart
DISKPART> list disk
/* Displays the list of disk available */
DISKPART> select disk 1
/* Select your desired Drive */
DISKPART> attributes disk...
What Is Network Topology And What Are Its Different Types?
What is Network Topology?
Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...
Database Keys
Keys
A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...




