Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...

Acunetix v10.5 released

0
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...

Best DNS Server -> Increase Internet Speed

0
List of Top 10 Best DNS Server : To increase Internet Speed Google: Preferred DNS server - 8.8.8.8 Alternate DNS server - 8.8.4.4 Norton DNS: Preferred...

What is Database Transaction ?

0
Transaction Management In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

The Power Of Social Networking

0
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

DBMS Client/Server Computing

0
Client/Server Architecture for DBMS Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...